نتایج جستجو برای: dids
تعداد نتایج: 849 فیلتر نتایج به سال:
In this paper, attacks caused in the shut circle control system is discussed. To keep the net-worked control systems safe, good, ready and hard to move, getting NCS from of the net attacks is very important. The marked power of thought attackers will not move after any made suggestion copies made to scale, they keep on changing their attack designs as if by chance and dynamically. Distributed g...
Computer security is defined as the protection of computing systems against threats to confidentiality, integrity, and availability. An intrusion is defined as any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource. The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known...
Interactive dynamic influence diagrams (I-DIDs) are graphical models for sequential decision making in partially observable settings shared by other agents. Algorithms for solving I-DIDs face the challenge of an exponentially growing space of candidate models ascribed to other agents, over time. Previous approach for exactly solving IDIDs groups together models having similar solutions into beh...
A database intrusion detection system (DIDS) is used to detect potential violations in database security. DIDS follows other traditional database security mechanisms and network security mechanisms such as firewall and network intrusion detection. Therefore, it faces the intrusion from internal users or the intrusion that can be passed through other security layers. This means that the number o...
Interactive dynamic influence diagrams (I-DIDs) provide an explicit way of modeling how a subject agent solves decision making problems in the presence of other agents in a common setting. To optimize its decisions, the subject agent needs to predict the other agents’ behavior, that is generally obtained by solving their candidate models. This becomes extremely difficult since the model space m...
Interactive dynamic influence diagrams (I-DIDs) are graphical models for sequential decision making in partially observable settings shared by other agents. Algorithms for solving I-DIDs face the challenge of an exponentially growing space of candidate models ascribed to other agents, over time. Previous approach for exactly solving IDIDs groups together models having similar solutions into beh...
Most user authentication methods and identity proving systems rely on a centralized database. Such information storage presents a single point of compromise from a security perspective. If this system is compromised it poses a direct threat to users digital identities. This paper proposes a decentralized authentication method, called the Horcrux protocol, in which there is no such single point ...
Interactive dynamic influence diagrams (I-DIDs) are recognized graphical models for sequential multiagent decision making under uncertainty. They represent the problem of how a subject agent acts in a common setting shared with other agents who may act in sophisticated ways. The difficulty in solving I-DIDs is mainly due to an exponentially growing space of candidate models ascribed to other ag...
Deoxygenation-induced cation movements in sickle cells were inhibited 80% to 85% by the anion transport inhibitor, 4,4’-diisothiocyano-2,2’disulfostilbene (DIDS). Morphologic sickling was not altered by DlDS treatment, demonstrating that morphologic sickling was not sufficient to produce cation leaks in sickle cells. DlDS inhibition of deoxygenationinduced cation flux was not affected when Irep...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید