نتایج جستجو برای: countermeasures

تعداد نتایج: 9039  

2003
Li-Chiou Chen Kathleen M. Carley

Are there properties of networks that affect the spread of anti-virus countermeasures? Is countermeasure spreading more effective through one network than through another? In this paper, we investigate this problem by simulating the impact of network topology on the effectiveness of anti-virus countermeasures. We simulate the spread of countermeasures based on the idea that computer viruses and...

2002
Christian Aumüller Peter Bier Wieland Fischer Peter Hofreiter Jean-Pierre Seifert

This article describes concrete results and practically validated countermeasures concerning differential fault attacks on RSA using the CRT. We investigate smartcards with an RSA coprocessor where any hardware countermeasures to defeat fault attacks have been switched off. This scenario was chosen in order to analyze the reliability of software countermeasures. We start by describing our labor...

2013
Nathan W. Twyman Ryan M. Schuetzler Jeffrey Gainer Proudfoot Aaron C. Elkins

Countermeasures, or techniques for hiding guilt during a credibility assessment examination, have long been an important topic in cognitive psychology and criminal justice fields. With recent IS research on automated screening systems, understanding the potential for countermeasures in this new paradigm is of increasing importance. This paper reports on a large experiment examining countermeasu...

2005
A. V. Panov S. V. Fesenko A.Yu. Pakhomov

In the long term after the Chernobyl accident the introduction of systems of countermeasures in agriculture must be based on the optimization principle. To implement this principle, a concept was used of evaluation of the effectiveness of countermeasures based on a cost-benefit analysis. Countermeasure options were developed separately for collective and private sectors of rural settlements. Fo...

2015
Satoko Tsuru Yoshinori Iizuka

Abstract—Healthcare safety has been perceived important. It is essential to prevent troubles in healthcare processes for healthcare safety. Trouble prevention is based on trouble prediction using accumulated knowledge on processes, troubles, and countermeasures. However, information on troubles has not been accumulated in hospitals in the appropriate structure, and it has not been utilized effe...

2013
Bariş Ege Amitabh Das Lejla Batina Ingrid Verbauwhede

Test compression schemes have been claimed to provide a certain level of security against scan-based side-channel attacks. To mitigate these attacks, a number of scan attack countermeasures are proposed in the literature. Recently, a new differential scan attack (DSA) is proposed which focuses on the S-box outputs rather than the S-box inputs as in previous attacks. In this paper, a systematic ...

2016
Timothy M. Uyeki Karl J. Erlandson George Korch Michael O’Hara Michael Wathen Jean Hu-Primmer Sally Hojvat Erik J. Stemmy Armen Donabedian

Preclinical development of and research on potential Middle East respiratory syndrome coronavirus (MERS-CoV) medical countermeasures remain preliminary; advancements are needed before most countermeasures are ready to be tested in human clinical trials. Research priorities include standardization of animal models and virus stocks for studying disease pathogenesis and efficacy of medical counter...

Journal: :Decision Analysis 2006
Detlof von Winterfeldt Terrence M. O'Sullivan

T paper describes a decision tree analysis to assess the cost-effectiveness of MANPADS (Man-Portable Air Defense Systems) countermeasures. These countermeasures are electronic devices that can be installed on commercial airplanes to detect and deflect surface-to-air missiles (SAMs) fired by terrorists. The model considers a terrorist attempt to shoot down a commercial airplane with a heat-seeki...

Journal: :IEICE Transactions 2010
So Ryoung Park Sanguk Noh

This paper investigates the autonomous decision-making process of the selection of alternative countermeasures against threats in electronic warfare settings. We introduce a threat model, which represents a specific threat pattern, and a methodology that decides the best countermeasure against real-time threats using the decision theory. To determine the optimal countermeasure, we model the pro...

2002
Andreas C. Schmidt

This contribution evaluates the security of VoIP networks. Potential threats to VoIP networks lead to unbearable risks which need to be eliminated by suitable countermeasures. However, cost and complexity of countermeasures should be adapted to the practical situation. Therefore the protection requirements are assessed. In this contribution the range of possible protection requirements is divid...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید