نتایج جستجو برای: sabotage

تعداد نتایج: 598  

Journal: :Packaging, Transport, Storage & Security of Radioactive Material 2008

Journal: :Communications in computer and information science 2022

Abstract Artificial intelligence (AI) and machine learning (ML) methods are increasingly adopted in cyberattacks. AI supports the establishment of covert channels, as well obfuscation malware. Additionally, results new forms phishing attacks enables hard-to-detect cyber-physical sabotage. Malware creators deploy ML to improve their attack’s capabilities. Defenders must therefore expect unconven...

Journal: :American Political Science Review 2021

Does physical surveillance hinder or foster antiregime resistance? A common view holds that prevents resistance by providing regimes with high-quality intelligence on dissident networks and instilling fear in citizens. We contrast this using formerly classified data from Communist Poland. find communities exposed to secret police officers were more likely organize protests but also engaged less...

Journal: :Ergonomi 2023

Integrating a technology into business and making it sustainable can be achieved with good analysis systematic workplace organization. In today's world, where everything has become more connected (Internet of Things, industrial internet, etc.), is difficult to analyze risks compared the traditional point view. Analyzing ranking them in order importance closely related proven dangers these techn...

Journal: :Revista Katálysis 2022

Resumo: A finalidade deste artigo é apresentar alguns aspectos relevantes sobre a relação entre arte e Serviço Social. Com base em contribuições teóricas, na perspectiva interdisciplinar, investigação qualitativa exploratória com delimitação artística música rap, foram analisadas duas canções: Periferia o alvo, do grupo Visão de Rua – Dina Di (1976-2010), Tum DJ O.G Rap compromisso, Sabotage (1...

2013
Bin Zeng

Current software stacks are built on top of unsafe languages such as C and C++. Software attacks sabotage program executions by inducing control flow transfers to shellcode or manipulating data pointers to read/write sensitive information. By embedding security checks into subject programs during compilation, many attacks can be foiled effectively. In this proposal, we investigate current softw...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید