نتایج جستجو برای: denial of critical idea

تعداد نتایج: 21198708  

Journal: :J. Inf. Sci. Eng. 2011
Gu Hsin Lai Chen-Sen Ouyang Chia-Mei Chen

Wireless sensor networks consist of many tiny sensors with sensing and communication ability. The applications of wireless sensor networks are widely used today in battlefield guard, circumstance monitor, and traffic analysis. Sensor network often carries on mission-critical tasks. Thus, security in sensor network is vital. Wormhole attack may threat the availability of networks by dropping dat...

2012
Blaž Ivanc

The development and connection of information and communication technologies with industrial control systems in the so-called critical infrastructure have contributed to the emergence of new complex threats. The critical infrastructure has become a target of sophisticated cyber attacks which exploit several, also unknown, vulnerabilities in one course of an attack. The paper proposes an attack ...

2015
M. Prabu S. Vijaya Rani R. Santhosh Kumar P. Venkatesh

Adhoc and sensor wireless networks are challenging and promising field for researchers. These networkingtechnology are not only significant on science and engineering but important on a broad range of applications such as critical infrastructure protection and security, disaster relief operations, biodiversity mapping, medicine and healthcare etc. Wireless Sensor Network applications require Wi...

2002
Vadim Kuznetsov Helena Sandström Andrei Simkin

The problem of identifying the sources of a denial of service attack is among the hardest in the Internet security area, especially since attackers often use incorrect, or spoofed, source IP addresses. In this paper we present the results from a comparison between some of the most promising traceback techniques proposed to solve this problem. Our goal was to evaluate and analyse the most promis...

2012
Fei He Jun Zhuang Nageswara S. V. Rao

Critical infrastructures rely on cyber and physical components that are both subject to natural, incidental or intentional degradations. Game theory has been used in studying the strategic interactions between attackers and defenders for critical infrastructure protection, but has not been extensively used in complex cyber-physical networks. This paper fills the gap by modeling the probabilitie...

Journal: :IJCIP 2013
Béla Genge Christos Siaterlis

Modern critical infrastructures such as the power grid are frequently targeted by distributed denial-of-service (DDoS) attacks. Unlike traditional information and communications systems, where the effects of DDoS attacks are mostly limited to the cyber realm, disruptive attacks on critical infrastructure assets can result in the loss of vital services such as transportation and health care. Thi...

2007
Tanveer Zia

Wireless sensor networks have very promising future to many applications. Ensuring that sensor nodes locations are verified and are protected from malicious attacks will enable sensor networks deployment in mission critical applications. Due to the deployment nature, sensor nodes are highly vulnerable to localization attacks where an adversary can capture the nodes, changes its location or repl...

2004
Tim Crane

This paper is an attempt to understand the content of, and motivation for, a popular form of physicalism, which I call ‘non-reductive physicalism’. Non-reductive physicalism claims although the mind is physical (in some sense), mental properties are nonetheless not identical to (or reducible to) physical properties. This suggests that mental properties are, in earlier terminology, ‘emergent pro...

The classical PERT approach uses the path with the largest expected duration as the critical path to estimate the probability of completing a network by a given deadline. However, in general, such a path is not the most critical path (MCP) and does not have the smallest estimate for the probability of completion time. The main idea of this paper is derived from the domination structure between ...

Journal: :CoRR 2015
Anees Ara Mznah Al-Rodhaan Yuan Tian Abdullah Al-Dhelaan

Cyber physical systems (CPS) are mission critical systems engineered by combination of cyber and physical systems respectively. These systems are tightly coupled, resource constrained systems and have dynamic real time applications. Due to the limitation of resources, and in order to improve the efficiency of the CPS systems, they are combined with cloud computing architecture, and are called a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید