Evading predictors with creatures

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evading Predictors with Creatures

We continue the theory of evasion and prediction which was introduced by Blass and developed by Brendle, Shelah, and Laflamme. We prove that for arbitrary sufficiently different f, g ∈ ωω, it is consistent to have eg < ef , where ef is the evasion number of the space ∏ n<ω f(n). For this we apply a variant of Shelah’s “creature forcing”.

متن کامل

Games with creatures

Many forcing notions obtained using the creature technology are naturally connected with certain integer games.

متن کامل

Evading DDoS detection with mimicry attacks

Distributed Denial of Service (DDoS) attacks are security attacks that prevent normal use of communication facilities. More and more DDoS attacks are occurring each day. Conventional DDoS attacks are typically based on flooding the server. Currently, other types of DDoS attacks have been observed, such as the mimicry DDoS attack. The mimicry attack is characterized by (1) gradual increase in th...

متن کامل

Evading Censorship with Browser-Based Proxies

While Internet access to certain sites is blocked in some parts of the world, these restrictions are often circumvented using proxies outside the censored region. Often these proxies are blocked as soon as they are discovered. In this paper we propose a browser-based proxy creation system that generates a large number of short-lived proxies. Clients using the system seamlessly hop from one prox...

متن کامل

Evading Anti-debugging Techniques with Binary Substitution

Anti-debugging technology refers to various ways of preventing binary files from being analyzed in debuggers or other virtual machine environments. If binary files conceal or modify themself using anti-debugging techniques, analyzing these binary files becomes harder. There are some anti-anti-debugging techniques proposed so far, but malware developers make dynamic analysis difficult using vari...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings of the American Mathematical Society

سال: 1998

ISSN: 0002-9939,1088-6826

DOI: 10.1090/s0002-9939-98-04410-4