نتایج جستجو برای: nine weaknesses
تعداد نتایج: 221784 فیلتر نتایج به سال:
As smartphones are generalized, various technologies and services have been introduced and are in wide use. From simply using calling or texting services, Internet banking and transaction system that require sensitive personal information emerged. Google’s Android, one of the representative OS of smartphones, was developed based on an open source, having various weaknesses and exposed to securi...
Metal ceramic restorations were considered the gold standard as reliable materials. Increasing demand for esthetics supported the commercialization of new metal free restorations. A growing demand is rising for zirconia prostheses. Peer-reviewed articles published till July 2013 were identified through a Medline (Pubmed and Elsevier). Emphasizing was made on zirconia properties and applications...
Object-oriented database systems began developing in the mid-80’s out of a necessity to meet the requirements of applications beyond the data processing applications which were [are] served by relational database systems. This paper serves as an overview on the achievements of object-oriented database technology so far, and also discusses the weaknesses that have to be yet resolved by the objec...
Web-based mechanisms, often mediated by malicious JavaScript code, play an important role in malware delivery today, making defenses against web-borne malware crucial for system security. This paper explores weaknesses in existing approaches to the detection of malicious JavaScript code. These approaches generally fall into two categories: lightweight techniques focusing on syntactic features s...
A significant number of attacks on systems are against the non-cryptographic components such as the human interaction with the system. In this paper, we propose a taxonomy of human-protocol interaction weaknesses. This set of weaknesses presents a harmonization of many findings from different research areas. In doing so we collate the most common human-interaction problems that can potentially ...
A recent article in TREE [1] presented a heavily documented review of experimental evolution, addressing three major issues: main questions and applications; experimental design and study systems; and caveats and limitations. Here, we comment on the latter issue. The soundness of a scientific method depends on not only its adequacy relative to the specific goals, but also the relative suitabili...
BACKGROUND considerable changes have occurred over the last 5 years in the organization of out-of-hours care in the UK. Users' experiences of their care are an important part of 'quality of care' and are valuable for identifying areas for improvement. AIM to identify strengths and weaknesses of out-of hours service provision in Wales. The design of the study is a cross-sectional survey. The s...
BACKGROUND To develop and implement more effective programs of health care delivery to prevent and control diabetes, Iran has developed and implemented the urban phase of the specialized care program for diabetic's patients. Deeply understanding the views and experiences of various stakeholders in this program can assist policy makers to identify the program's strengths and weaknesses and enabl...
We propose a new attack on Feistel ciphers with a non-surjective round function. CAST and LOKI91 are examples of such ciphers. We extend the attack towards ciphers that use a non–uniformly distributed round function and apply the attack to CAST.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید