نتایج جستجو برای: denial of critical idea

تعداد نتایج: 21198708  

Journal: :Compare: A Journal of Comparative and International Education 2021

Journal: :Science 1905

Journal: :IEEE Wireless Commun. 2010
Yanzhi Ren Mooi Choo Chuah Jie Yang Yingying Chen

The Delay Tolerant Networks (DTNs) are especially useful in providing mission critical services including emergency scenarios and battlefield applications. However, DTNs are vulnerable to wormhole attacks, in which a malicious node records the packets at one location and tunnels them to another colluding node, which replays them locally into the network. Wormhole attacks are a severe threat to ...

2014
Blaž Ivanc Tomaž Klobučar

The development and connection of information and communication technologies with industrial control systems in the so-called critical infrastructure have contributed to the emergence of new complex threats. The critical infrastructure has become a target of sophisticated cyber attacks which exploit numerous known as well as unknown vulnerabilities in one course of an attack. The paper proposes...

Journal: :Future Generation Comp. Syst. 2004
Byoung-Joon Min Joong-Sup Choi

In many mission-critical applications, important services should be maintained properly under any circumstances including the presence of compromised components incurred by outside intentional attacks. In the paper, a two-level approach for the intrusion tolerance is presented. At the node level, by means of dynamic resource reallocation within a computing node, the critical services previously...

Journal: :CoRR 2016
James Christopher Foreman

Our Critical Infrastructure (CI) systems are, by definition, critical to the safe and proper functioning of society. Nearly all of these systems utilize industrial Process Control Systems (PCS) to provide clean water, reliable electricity, critical manufacturing, and many other services within our communities – yet most of these PCS incorporate very little cyber-security countermeasures. Cyber-...

Journal: :IJCIP 2015
Mark Yampolskiy Péter Horváth Xenofon D. Koutsoukos Yuan Xue Janos Sztipanovits

The security of cyber-physical systems is of paramount importance because of their pervasiveness in the critical infrastructure. Protecting cyber-physical systems greatly depends on a deep understanding of the possible attacks and their properties. The prerequisite for quantitative and qualitative analyses of attacks is a knowledge base containing attack descriptions. The structure of the attac...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی 1399

این پژوهش کوشیده است تأثیر به کارگیری راهبردهای زایا را بر پیشرفت و بسندگی در خواندن و درک مطلب و نیز بر تفکر انتقادی زبان آموزان انگلیسی را بررسی کند. در این پژوهش تعداد 46 دانش آموز دختر در مقطع متوسطه اول به صورت تصادفی انتخاب وبه دو گروه تجربی و شاهد با تعداد دانش آموزان مساوی در هر گروه تقسیم شدند. به هر دو گروه سه داستان کوتاه به عنوان موضوع خواندن برای کلاس داده شد. به گروه تجربی درابتدا...

2006
James A. Lewis

Cybersecurity entails the safeguarding of computer networks and the information they contain from penetration and from malicious damage or disruption. Since the use of computer networks has become a major element in governmental and business activities, tampering with these networks can have serious consequences for agencies, firms and individuals. The question is to what degree these individua...

2009
Patrick Düssel Christian Gehl Pavel Laskov Jens-Uwe Bußer Christof Störmann Jan Kästner

With an increasing demand of inter-connectivity and protocol standardization modern cyber-critical infrastructures are exposed to a multitude of serious threats that may give rise to severe damage for life and assets without the implementation of proper safeguards. Thus, we propose a method that is capable to reliably detect unknown, exploit-based attacks on cyber-critical infrastructures carri...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید