Cyber Collateral Damage

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Understanding Cyber Collateral Damage

INTRODUCTION In conventional (kinetic) U.S. warfare, there exists a standard methodology for identifying and assessing collateral damage (i.e. accidental damage to civilian targets). Indeed, the U.S. Department of Defense (DoD) relies on a governing document that defines the policy regarding unlawful military targets (no-strike targets), and methods for estimating collateral damage from kinetic...

متن کامل

Evader Interdiction and Collateral Damage

In network interdiction problems, evaders (e.g., hostile agents or data packets) may be moving through a network towards targets and we wish to choose locations for sensors in order to intercept the evaders before they reach their destinations. The evaders might follow deterministic routes or Markov chains, or they may be reactive, i.e., able to change their routes in order to avoid sensors pla...

متن کامل

Collateral Damage from Antigen Receptor Gene Diversification

Chromosomal translocations that juxtapose antigen receptor genes and oncogenes are frequently associated with lymphoid malignancies. In this issue, Robbiani et al. (2008) show that activation-induced deaminase (AID), an enzyme involved in antigen receptor gene diversification, generates DNA double-strand breaks (DSBs) in oncogenes, and Tsai et al. (2008) propose that AID and the recombinase-act...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Procedia Computer Science

سال: 2016

ISSN: 1877-0509

DOI: 10.1016/j.procs.2016.09.287