نتایج جستجو برای: countermeasure

تعداد نتایج: 4411  

Journal: :Environmental Modelling and Software 2001
Luigi Monte

This paper describes a generic model for predicting the migration of 137 Cs and 90 Sr through complex catchments and the effects of countermeasures to reduce the contamination levels. The model provides assessments of radionuclide behaviour in water systems comprised of rivers, lakes and reservoirs. It makes use of aggregate, “collective” parameters which summarise the overall effects of compet...

2010
Hitomi Yamada Shigeki Kuwata Keunsik Park Kenji Ohata

This study aimed at clarifying the issues of the system that needs to be improved in order to raise the precision of computer-assisted ICD-10 encoding, by analyzing the inconsistency between the codes registered by physician and encoded by experts in discharge summaries of the electronic patient record system. It was found that human related factors led to the major inconsistency at the chapter...

Journal: :IJSN 2008
Eric Cronin Micah Sherr Matt Blaze

We investigate the reliability of current generation eavesdropping tools and show that obtaining “high fidelity” transcripts is harder than previously assumed. Even in situations highly favorable to the eavesdropper, simple unilateral countermeasures are shown to be sufficient to prevent all tested systems from reliably reconstructing communicated messages. Less than a third of the tested syste...

2010
Eric Vétillard Anthony Ferrari

Logical attacks on smart cards have been used for many years, but their attack potential is hindered by the processes used by issuers to verify the validity of code, in particular bytecode verification. More recently, the idea has emerged to combine logical attacks with a physical attack, in order to evade bytecode verification. We present practical work done recently on this topic, as well as ...

2011
Mengchun Ding Dan Wang Ying Wang

China’s automobile industry has made great progress and contributed a lot to national economic development, but the problems such as dispersion, small, disorderly, worse" in the industry is still very serious. Starting from the SCP paradigm theory in China’s automobile industry, the article analyses the problems including the market structure, market conduct and market performance in China’s au...

2013
Behnam Bahrak Jung-Min “Jerry” Park

The use of geolocation databases for enabling spectrum sharing in the TV bands has been mandated by the Federal Communications Commission (FCC), and it is very likely to be adopted for other spectrum sharing applications as well. Although using geolocation databases is a practical approach for enabling spectrum sharing, it poses a potentially serious privacy problem. Secondary users (queriers),...

Journal: :IACR Cryptology ePrint Archive 2016
Dahmun Goudarzi Matthieu Rivain

It is widely accepted that higher-order masking is a sound countermeasure to protect implementations of block ciphers against side-channel attacks. The main issue while designing such a countermeasure is to deal with the nonlinear parts of the cipher i.e. the so-called s-boxes. The prevailing approach to tackle this issue consists in applying the Ishai-Sahai-Wagner (ISW) scheme from CRYPTO 2003...

Journal: :IACR Cryptology ePrint Archive 2015
Sikhar Patranabis Abhishek Chakraborty Debdeep Mukhopadhyay P. P. Chakrabarti

Biased fault attacks such as the Differential Fault Intensity Analysis (DFIA) have been a major threat to cryptosystems in recent times. DFIA combines principles of side channel analysis and fault attacks to try and extract the key using faulty ciphertexts only. Biased fault attacks have also been shown to weaken traditional redundancy based countermeasures, such as Concurrent Error Detection (...

2005
Gabriel Becerra Jordan Kidney Jason Heard Rob Kremer Jörg Denzinger

Multi-agent systems are one of the fastest growing areas in computer science thanks to their synergistic properties and the applicability of their characteristics in both technological and non-technological areas. Virus and other malicious software writers have not ignored this fact and are now either taking advantage of multi-agent systems. In some cases, multi-agent methodologies are used to ...

Journal: :PLoS neglected tropical diseases 2016
Robert W Malone Jane Homan Michael V Callahan Jill Glasspool-Malone Lambodhar Damodaran Adriano De Bernardi Schneider Rebecca Zimler James Talton Ronald R Cobb Ivan Ruzic Julie Smith-Gagen Daniel Janies James Wilson

INTRODUCTION Reports of high rates of primary microcephaly and Guillain-Barré syndrome associated with Zika virus infection in French Polynesia and Brazil have raised concerns that the virus circulating in these regions is a rapidly developing neuropathic, teratogenic, emerging infectious public health threat. There are no licensed medical countermeasures (vaccines, therapies or preventive drug...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید