Advancing by stealth

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tobacco Marketing by Stealth

1389 This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs licence (http://creativecommons.org/ licenses/by-nc-nd/3.0/), which permits non-commercial reproduction and distribution of the work, in any medium, provided the original work is not altered or transformed in any way, and that the work is properly cited. For commercial re-u...

متن کامل

Grid-Enabling Natural Language Engineering By Stealth

:H GHVFULEH D SURSRVDO IRU DQ H[WHQVLEOH FRPSRQHQW EDVHG VRIWZDUH DUFKLWHFWXUH IRU QDWXUDO ODQJXDJH HQJL QHHULQJ DSSOLFDWLRQV 2XU PRGHO OHYHUDJHV H[LVWLQJ OLQ JXLVWLF UHVRXUFH GHVFULSWLRQ DQG GLVFRYHU\ PHFKDQLVPV EDVHG RQ H[WHQGHG 'XEOLQ &RUH PHWDGDWD ,Q DGGLWLRQ DSSOLFDWLRQ GHVLJQ LV IOH[LEOH DOORZLQJ GLVSDUDWH FRP SRQHQWV WR EH FRPELQHG WR VXLW WKH RYHUDOO DSSOLFDWLRQ IXQFWLRQDOLW\ $Q DSSOLFD...

متن کامل

“Stealth” tumors

Breast cancers (BCs) comprise heterogeneous subtypes of various prognoses. An active anti-tumor immune profile usually correlated with a better survival. Two current major challenges of BC research are to understand the inter-relations between BC and anti-tumor immunity, and to identify candidates whose targeting would contribute to enhance anti-tumor efficiency.

متن کامل

Stealth DoS

Users and providers increasingly disagree on what Denial of Service (DoS) is. For example, an ISP might consider large multimedia downloads an attack to overload its infrastructure or have it pay high interconnection fees. On the other hand, a user will certainly consider selective bandwidth reduction that is used by ISPs as a countermeasure, as a DoS measure. Given the nature of their business...

متن کامل

Introducing Stealth Malware Taxonomy

Introduction At the beginning of this year, at Black Hat Federal Conference, I proposed a simple taxonomy that could be used to classify stealth malware according to how it interacts with the operating system. Since that time I have often referred to this classification as I think it is very useful in designing system integrity verification tools and talking about malware in general. Now I deci...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature

سال: 1983

ISSN: 0028-0836,1476-4687

DOI: 10.1038/302761a0