نتایج جستجو برای: attacks after radiation therapy smart
تعداد نتایج: 2440113 فیلتر نتایج به سال:
The last years have seen an unprecedented amount of attacks. Intrusions on IT-Systems are rising constantly both from a quantitative as well as a qualitative point of view. Recent examples like the hack of the Sony Playstation Network or the compromise of RSA are just some examples of high-quality attack vectors. Since these Smart Attacks are specifically designed to permeate state of the art t...
As much as possible, it is important that the smart grid is secure from cyber-attacks. A vital part of ensuring the security of smart grids is to perform a cybersecurity risk assessment that methodically examines the impact and likelihood of cyber-attacks. Based on the outcomes of a risk assessment, security requirements and controls can be determined that inform architectural choices and addre...
sinonasal teratocarcinosarcoma (sntcs) is a rare tumor characterized by mixture architecture of epithelial and mesenchymal components. sntcs is a highly malignant tumor displaying progressive and aggressive growth with poor prognosis. only about 40% of all patients survive after five years. it seems the combination of surgery and radiotherapy currently is the most effective treatment. in this r...
extra renal extra cranial malignant rhobdoid tumors (mrt) are rare, frequently lethal and affect mostly children. no definite treatment has been made and the role of radiation therapy is poorly defined. this report explains a 14 year old girl with mrt in her neck soft tissue. she is alive with no evidence of disease 18 months after diagnosis. through the experience with this case, we suggested ...
anxiety is one common disorder during childhood. in curing anxiety disorders, there are different types of psychological remedies, pharmotherapy, family therapy, and music therapy that can improve the individual’s anxiety, but we need some other remedies to improve social and emotional relationship and interactions. considering the importance of curing the anxiety disorders, the effect of sand ...
Internet of things (IoT) gets more spread, and large number of smart things are connect to the Internet. In this regard, increases energy consumption. The devices of the IoT can be affected by special attacks on the power supply system, DDos attacks, spy attacks. The purpose of research is to develop and research an availability model of IoT systems considering energy modes and cyber attacks. T...
The most important characteristic of RFID-based electronic voting system compared to traditional voting system is that votes in the electronic system are as contactless smart cards in place of paper ballots. For casting ballots, voters use a computer terminal to write their choices (their chosen candidates) into contactless smart cards and then put the smart card inside the box. The most import...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید