منابع مشابه
Tobacco Marketing by Stealth
1389 This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs licence (http://creativecommons.org/ licenses/by-nc-nd/3.0/), which permits non-commercial reproduction and distribution of the work, in any medium, provided the original work is not altered or transformed in any way, and that the work is properly cited. For commercial re-u...
متن کاملGrid-Enabling Natural Language Engineering By Stealth
:H GHVFULEH D SURSRVDO IRU DQ H[WHQVLEOH FRPSRQHQW EDVHG VRIWZDUH DUFKLWHFWXUH IRU QDWXUDO ODQJXDJH HQJL QHHULQJ DSSOLFDWLRQV 2XU PRGHO OHYHUDJHV H[LVWLQJ OLQ JXLVWLF UHVRXUFH GHVFULSWLRQ DQG GLVFRYHU\ PHFKDQLVPV EDVHG RQ H[WHQGHG 'XEOLQ &RUH PHWDGDWD ,Q DGGLWLRQ DSSOLFDWLRQ GHVLJQ LV IOH[LEOH DOORZLQJ GLVSDUDWH FRP SRQHQWV WR EH FRPELQHG WR VXLW WKH RYHUDOO DSSOLFDWLRQ IXQFWLRQDOLW\ $Q DSSOLFD...
متن کامل“Stealth” tumors
Breast cancers (BCs) comprise heterogeneous subtypes of various prognoses. An active anti-tumor immune profile usually correlated with a better survival. Two current major challenges of BC research are to understand the inter-relations between BC and anti-tumor immunity, and to identify candidates whose targeting would contribute to enhance anti-tumor efficiency.
متن کاملStealth DoS
Users and providers increasingly disagree on what Denial of Service (DoS) is. For example, an ISP might consider large multimedia downloads an attack to overload its infrastructure or have it pay high interconnection fees. On the other hand, a user will certainly consider selective bandwidth reduction that is used by ISPs as a countermeasure, as a DoS measure. Given the nature of their business...
متن کاملIntroducing Stealth Malware Taxonomy
Introduction At the beginning of this year, at Black Hat Federal Conference, I proposed a simple taxonomy that could be used to classify stealth malware according to how it interacts with the operating system. Since that time I have often referred to this classification as I think it is very useful in designing system integrity verification tools and talking about malware in general. Now I deci...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature
سال: 1983
ISSN: 0028-0836,1476-4687
DOI: 10.1038/302761a0