نتایج جستجو برای: unauthorized tissues
تعداد نتایج: 198978 فیلتر نتایج به سال:
Background & Aims of the Study: Risky driving behaviors are a set of actions that put drivers at the risk of death or injuries which are caused by the violations of legal standards. These kinds of behaviors are the key factor leading to a higher risk of traffic crashes and injuries. The present study aimed to investigate the situation of some high-risk traffic behaviors and the related factors ...
objectives: toxoplasma gondii is a coccidian protozoon which forms tissue cyst in different organs of infected intermediate host. the present study was conducted to demonstrate the active form of parasite in different tissues of rat, which was experimentally infected with rh strain of toxoplasma gondii using bioassay method inmice. materials & methods: in the experimental assay, 75 rats an...
T he United States is experiencing an unprecedented influx of unauthorized insurers selling phony health insurance.The last time this occurred, more than a decade ago, nearly 400,000 people were left with $123 million in unpaid medical bills. Unauthorized health insurance companies intentionally fail to comply with state and federal law regarding insurance regulation; they collect premiums for ...
Instruction-set randomization (ISR) obfuscates the “language” understood by a system to protect against code-injection attacks by presenting an ever-changing target. ISR was originally motivated by code injection through buffer overflow vulnerabilities. However, Stuxnet demonstrated that attackers can exploit other vectors to place malicious binaries into a victim’s filesystem and successfully ...
Academic and commercial 802.11 hotspots often use an SSLsecured captive portal to authenticate clients. Captive portals provide good usability and interoperability, but poor security. After a captive portal has authenticated a client, session hijacking and freeloading allow attackers to capture or use the client’s session. Freeloading does not require special tools and, surprisingly, is strengt...
The modern multi-tier web applications and information systems store and process various types of data. Some of them are stored in a database, controlled by an external database management system, while other data are stored directly within the server’s file system. The database is secured by the database management system itself, but it is a programmer’s responsibility to design and develop a ...
(this article cites 46 articles hosted on the Citations use or unauthorized distribution.
1570-8705/$ see front matter 2011 Published b doi:10.1016/j.adhoc.2011.04.003 ⇑ Corresponding author. E-mail addresses: [email protected] ( rutgers.edu (L.J. Greenstein), [email protected] [email protected] (Y. Chen). Dynamic spectrum access has been proposed as a means to share scarce radio resources, and requires devices to follow protocols that access spectrum resources in a ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید