نتایج جستجو برای: legitimate
تعداد نتایج: 10391 فیلتر نتایج به سال:
In this paper, we investigate the effect of output quantization on the secrecy capacity of the binary-input Gaussian wiretap channel. As a result, a closed-form expression with infinite summation terms of the secrecy capacity of the binary-input Gaussian wiretap channel is derived for the case when both the legitimate receiver and the eavesdropper have unquantized outputs. In particular, comput...
Recently, the finite state Markov channel (FSMC) with an additional eavesdropper and delayed feedback from the legitimate receiver to the transmitter has been shown to be a useful model for the physical layer security of the practical mobile wireless communication systems. In this paper, we extend this model to a multiple-access situation (up-link of the wireless communication systems), which w...
Robert Merton's (1957) theories of anomie and strain are among the most widely examined theories of criminality. Messner and Rosenfeld's (1994) theory of institutional anomie built on Merton's conception of anomie, delineating how specific institutions lead to conditions of anomie and criminality. Cloward and Ohlin's (1961) theory of differential opportunity built upon Merton's strain theory, u...
Statistical spam filters are known to be vulnerable to adversarial attacks. One of the more common adversarial attacks, known as the good word attack, thwarts spam filters by appending to spam messages sets of “good” words, which are words that are common in legitimate email but rare in spam. We present a counterattack strategy that attempts to differentiate spam from legitimate email in the in...
Content-Centric Networking (CCN) is a candidate future Internet architecture that gives favorable promises in MANET environment. It is allowed that data of content producer is cached anywhere in Content Centric MANET (CCMANET). This scheme decoupling of data from the source make traditional end-end authentication transmission unavailable in CCMANET. To ensure high availability of the cached dat...
Distributed Denial of Service (DDoS) attacks have become a major threat to the stability of the internet and there is no satisfactory solution yet. These attacks are familiar threats to internet users for more than 10 years. Such attacks are carried out by a "bot-net", an army of zombie hosts spread around the internet, that overwhelm the bandwidth toward their victim web server, by s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید