نتایج جستجو برای: شبیهسازی عددی مستقیم dns
تعداد نتایج: 62200 فیلتر نتایج به سال:
This paper presents techniques for optimal control of turbulent flows based on the dynamic subgrid-scale LES model. This control scheme has been implemented using a finite time-window approach where the flow sensitivity is computed from the adjoint LES equations. LES results for optimal control of terminal turbulent kinetic energy are compared to Direct Numerical Simulation (DNS) under similar ...
We statistically investigated the DNS query access traffic from a university campus network toward the top domain DNS (tDNS) through March 14th, 2009, when the hosts in the campus network were under inbound SSH dictionary attack. The interesting results are obtained, as follows: (1) the several hosts generated the DNS query packet traffic, taking a rate of more than 1,000 hour−1, through 07:30-...
A simple atomic relay function is proposed as a minimal trusted computing base (TCB) for a domain name system (DNS) server. This TCB, composed of a fixed sequence of logical and cryptographic hash operations, can be amplified to ensure that a DNS server cannot violate rules. The paper also outlines elements of a TCB-DNS protocol that amplifies the simple TCB to secure the domain name system. Th...
The Domain Name System (DNS) provides a mapping between host names and Internet Protocol (IP) addresses. Hosts that are configured using the Dynamic Host Configuration Protocol (DHCP) can have their assigned IP addresses updated in a Dynamic DNS (DDNS). DNS and DDNS are critical components of the Internet. Most applications use host names rather than IP addresses, allowing the underlying operat...
The Domain Name System (DNS) is an essential protocol used by both legitimate Internet applications and cyber attacks. For example, botnets rely on DNS to support agile command and control infrastructures. An effective way to disrupt these attacks is to place malicious domains on a “blocklist” (or “blacklist”) or to add a filtering rule in a firewall or network intrusion detection system. To ev...
BACKGROUND AND AIMS Some follow-up studies of large regenerative nodules (LRNs) and dysplastic nodules (DNs) were reported previously. However, the pre-malignant potentiality of LRNs has remained controversial up to now. No LRNs showed malignant transformation in our previous study. We aimed to evaluate the pre-malignant potentiality of LRNs and DNs with a greater number of cases and longer fol...
در این پژوهش، شبیهسازی عددی جریان توأم با اسپری و احتراق در موتور دیزل پاشش مستقیم روی شبکه متحرک با سازمان انجام شده است. همه پدیدههای مؤثر در عملکرد موتور، از قبیل پاشش، تبخیر، شکست و برخورد قطرات، برخورد قطرات به دیواره، انتقال حرارت به دیواره، احتراق و ... در نظر گرفته شدهاند. پروسه احتراق به صورت سینتیک شیمیایی بوده و اثار آشفتگی بر اختلاط سوخت و هوا و نرخ واکنش شیمیایی ملحوظ شده است. ...
Previous attacks that link the sender and receiver of traffic in the Tor network (“correlation attacks”) have generally relied on analyzing traffic from TCP connections. The TCP connections of a typical client application, however, are often accompanied by DNS requests and responses. This additional traffic presents more opportunities for correlation attacks. This paper quantifies how DNS traff...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید