نتایج جستجو برای: countermeasures
تعداد نتایج: 9039 فیلتر نتایج به سال:
Traffic analysis attacks aim at deriving mission critical information from the analysis of the traffic transmitted over a network. Countermeasures for such attacks are usually realized by properly “padding” the payload traffic so that the statistics of the overall traffic become significantly different from that of the payload traffic. In this paper, we propose a analytical framework for traffi...
INTRODUCTION The global threat of a chemical, biological, radiological, or nuclear (CBRN) disaster is an important priority for all government agencies involved in domestic security and public health preparedness. Radiological/nuclear (RN) attacks or accidents have become a larger focus of the United States Food and Drug administration (US FDA) over time because of their increased likeliness. C...
BACKGROUND No studies have been published on an astronaut population to assess the effectiveness of countermeasures for limiting physiological changes in the lumbopelvic region caused by microgravity exposure during spaceflight. However, several studies in this area have been done using spaceflight simulation via bed-rest. The purpose of this systematic review was to evaluate the effectiveness ...
Distributed Denial of Service (DDoS) attacks have become a large problem for users of computer systems connected to the Internet. DDoS attackers hijack secondary victim systems using them to wage a coordinated large-scale attack against primary victim systems. As new countermeasures are developed to prevent or mitigate DDoS attacks, attackers are constantly developing new methods to circumvent ...
The U.S. government does not yet have the range of medical countermeasures needed to protect its citizens from anthrax and other potential bioweapons. In the event of an anthrax attack, treatment interventions in addition to antibiotics would be needed so that very ill patients can be treated and clean-up crews can be better protected, especially if an engineered strain is used. This article de...
During a lawsuit, an organization is required to discover and produce relevant electronic data. In many cases, relevant data includes confidential data, such as personal information or trade secrets. During the course of a lawsuit, the discovered data may exchange many hands. This study analyzes data security threats and corresponding countermeasures within the eDiscovery process by constructin...
In this paper, we propose the Real-time Disaster Damage Information Sharing System for the disaster countermeasures headquarters at the time of large-scale natural disaster. This Real-time Disaster Damage Information Sharing System consists of the Post Damage Picture Smartphone Application, the Post Damage Picture Facebook Application, and the Web-GIS Disaster Information Management Site. The P...
Defence trees are used to represent attack and defence strategies in security scenarios; the aim in such scenarios is to select the best set of countermeasures that are able to stop all the vulnerabilities. In order to represent preferences among possible countermeasures of a given attack, defence trees are enriched with conditional preferences, obtaining a new structure called CP-defence tree....
Prevalent Wi-Fi networks have adopted various protections to prevent eavesdropping caused by the intrinsic shared nature of wireless medium. However, many of them are based on pre-shared secret incurring key management costs, and are still vulnerable from practical countermeasures. In this study, we investigate the feasibility of using defensive jamming technique to protect enterprise Wi-Fi net...
We identify a class of covert timing channels with the following properties. (1) existing covert timing channel analysis techniques are inappropriate for the channels in this class; and (2) it includes the fastest (i.e., highest capacity) covert channels known to date. Since channels in this class are exploited by counting the occurrences of certain events, we call them counting channels. We de...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید