نتایج جستجو برای: countermeasure
تعداد نتایج: 4411 فیلتر نتایج به سال:
This paper describes a generic model for predicting the migration of 137 Cs and 90 Sr through complex catchments and the effects of countermeasures to reduce the contamination levels. The model provides assessments of radionuclide behaviour in water systems comprised of rivers, lakes and reservoirs. It makes use of aggregate, “collective” parameters which summarise the overall effects of compet...
This study aimed at clarifying the issues of the system that needs to be improved in order to raise the precision of computer-assisted ICD-10 encoding, by analyzing the inconsistency between the codes registered by physician and encoded by experts in discharge summaries of the electronic patient record system. It was found that human related factors led to the major inconsistency at the chapter...
We investigate the reliability of current generation eavesdropping tools and show that obtaining “high fidelity” transcripts is harder than previously assumed. Even in situations highly favorable to the eavesdropper, simple unilateral countermeasures are shown to be sufficient to prevent all tested systems from reliably reconstructing communicated messages. Less than a third of the tested syste...
Logical attacks on smart cards have been used for many years, but their attack potential is hindered by the processes used by issuers to verify the validity of code, in particular bytecode verification. More recently, the idea has emerged to combine logical attacks with a physical attack, in order to evade bytecode verification. We present practical work done recently on this topic, as well as ...
China’s automobile industry has made great progress and contributed a lot to national economic development, but the problems such as dispersion, small, disorderly, worse" in the industry is still very serious. Starting from the SCP paradigm theory in China’s automobile industry, the article analyses the problems including the market structure, market conduct and market performance in China’s au...
The use of geolocation databases for enabling spectrum sharing in the TV bands has been mandated by the Federal Communications Commission (FCC), and it is very likely to be adopted for other spectrum sharing applications as well. Although using geolocation databases is a practical approach for enabling spectrum sharing, it poses a potentially serious privacy problem. Secondary users (queriers),...
It is widely accepted that higher-order masking is a sound countermeasure to protect implementations of block ciphers against side-channel attacks. The main issue while designing such a countermeasure is to deal with the nonlinear parts of the cipher i.e. the so-called s-boxes. The prevailing approach to tackle this issue consists in applying the Ishai-Sahai-Wagner (ISW) scheme from CRYPTO 2003...
Biased fault attacks such as the Differential Fault Intensity Analysis (DFIA) have been a major threat to cryptosystems in recent times. DFIA combines principles of side channel analysis and fault attacks to try and extract the key using faulty ciphertexts only. Biased fault attacks have also been shown to weaken traditional redundancy based countermeasures, such as Concurrent Error Detection (...
Multi-agent systems are one of the fastest growing areas in computer science thanks to their synergistic properties and the applicability of their characteristics in both technological and non-technological areas. Virus and other malicious software writers have not ignored this fact and are now either taking advantage of multi-agent systems. In some cases, multi-agent methodologies are used to ...
INTRODUCTION Reports of high rates of primary microcephaly and Guillain-Barré syndrome associated with Zika virus infection in French Polynesia and Brazil have raised concerns that the virus circulating in these regions is a rapidly developing neuropathic, teratogenic, emerging infectious public health threat. There are no licensed medical countermeasures (vaccines, therapies or preventive drug...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید