نتایج جستجو برای: legitimate

تعداد نتایج: 10391  

Journal: :International Journal of Humanities and Social Science 2020

Journal: :Entropy 2017
Chao Qi Yanling Chen A. J. Han Vinck

In this paper, we investigate the effect of output quantization on the secrecy capacity of the binary-input Gaussian wiretap channel. As a result, a closed-form expression with infinite summation terms of the secrecy capacity of the binary-input Gaussian wiretap channel is derived for the case when both the legitimate receiver and the eavesdropper have unquantized outputs. In particular, comput...

Journal: :CoRR 2017
Bin Dai Zheng Ma Yuan Luo Xiaohu Tang

Recently, the finite state Markov channel (FSMC) with an additional eavesdropper and delayed feedback from the legitimate receiver to the transmitter has been shown to be a useful model for the physical layer security of the practical mobile wireless communication systems. In this paper, we extend this model to a multiple-access situation (up-link of the wireless communication systems), which w...

2010
Daniel S. Murphy Matthew B. Robinson

Robert Merton's (1957) theories of anomie and strain are among the most widely examined theories of criminality. Messner and Rosenfeld's (1994) theory of institutional anomie built on Merton's conception of anomie, delineating how specific institutions lead to conditions of anomie and criminality. Cloward and Ohlin's (1961) theory of differential opportunity built upon Merton's strain theory, u...

Journal: :Journal of Machine Learning Research 2008
Zach Jorgensen Yan Zhou W. Meador Inge

Statistical spam filters are known to be vulnerable to adversarial attacks. One of the more common adversarial attacks, known as the good word attack, thwarts spam filters by appending to spam messages sets of “good” words, which are words that are common in legitimate email but rare in spam. We present a counterattack strategy that attempts to differentiate spam from legitimate email in the in...

Journal: :JCM 2016
Xian Guo Tao Feng Jun-li Fang Jing Wang Ye Lu

Content-Centric Networking (CCN) is a candidate future Internet architecture that gives favorable promises in MANET environment. It is allowed that data of content producer is cached anywhere in Content Centric MANET (CCMANET). This scheme decoupling of data from the source make traditional end-end authentication transmission unavailable in CCMANET. To ensure high availability of the cached dat...

2012
S. K. Lavanya B. Vinothkumar B. B. Gupta R. C. Joshi K. Kumar K. Singh C. Wang H. Kang Jaeyeon Jung Balachander Krishnamurthy David Moore Geoffrey Voelker

Distributed Denial of Service (DDoS) attacks have become a major threat to the stability of the internet and there is no satisfactory solution yet. These attacks are familiar threats to internet users for more than 10 years. Such attacks are carried out by a "bot-net", an army of zombie hosts spread around the internet, that overwhelm the bandwidth toward their victim web server, by s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید