نتایج جستجو برای: spying operation

تعداد نتایج: 211944  

Journal: :IEEE Transactions on Vehicular Technology 2022

In recent years, satellite communication (SatCom) systems have been widely used for navigation, broadcasting application, disaster recovery, weather sensing, and even spying on the Earth. As number of satellites is highly increasing with radical revolution in wireless technology, eavesdropping SatCom will be possible next-generation networks. this context, we introduce approach, where an spacec...

Drought is an inevitable part of the world’s climate. It occurs in wet as well as in dry regions. Therefore, planning for drought and mitigating its impacts is essential. In this study, a hedging rule is developed using the zero/one mixed integer-programming approach. Furthermore, some procedures are introduced to ease the computational burden inherent in integer programming. Hedging rules are ...

Journal: :The Bulletin of the American Academy of Psychiatry and the Law 1989
R L Goldstein

Lawyers have argued that surveillance of the forensic psychiatric examination is often necessary to protect clients' rights and assure more accurate reporting of the findings. This paper reports a new phenomenon which adds a disconcerting dimension to the current controversy over surveillance of such examinations, namely, surreptitious recording by patient/examinees of their own forensic examin...

2009
Diana Joumblatt Renata Teixeira Jaideep Chandrashekar Nina Taft

Obtaining data directly from end hosts could benefit a broad set of applications, including application performance diagnosis, network troubleshooting, security profiling and even energy-saving policies. However, the data central to the study and development of such tools is fundamentally hard to collect. This situation has arisen both for technical reasons and for psychological ones. We believ...

Journal: :CoRR 2010
Stevens Le Blond Arnaud Legout Fabrice Le Fessant Walid Dabbous Mohamed Ali Kâafar

This paper presents a set of exploits an adversary can use to continuously spy on most BitTorrent users of the Internet from a single machine and for a long period of time. Using these exploits for a period of 103 days, we collected 148 million IPs downloading 2 billion copies of contents. We identify the IP address of the content providers for 70% of the BitTorrent contents we spied on. We sho...

2018
Michael Kaplan

sovereign subject of democratic politics (Habermas 1974, 52). Appositely, the trope of public supervision has been indispensable to the critical literature on surveillance and Big Data (e.g., Allmer 2011; Fuchs 2011; Hier & Greenberg 2009; Gandy 2006; Lessig 1999; Lyon 2014; Marx 2004; Monahan 2010; Simon 2005; Turow 2014; O’Harrow 2005; Wood 2009). Indeed, even ‘post-panoptic’ and ‘post-repres...

2016
Guanhua Yan Yunus Kucuk Max Slocum David C. Last

Computer hackers or their malware surrogates constantly look for software vulnerabilities in the cyberspace to perform various online crimes, such as identity theft, cyber espionage, and denial of service attacks. It is thus crucial to assess accurately the likelihood that a software can be exploited before it is put into practical use. In this work, we propose a cognitive framework that uses B...

2010
Tyler Moore

Economics puts the challenges facing cybersecurity into perspective better than a purely technical approach does. Systems often fail because the organizations that defend them do not bear the full costs of failure. For instance, companies operating critical infrastructures have integrated control systems with the Internet to reduce near-term, measurable costs while raising the risk of catastrop...

2002
Daniel Diermeier Hülya Eraslan Antonio Merlo

The defining feature of parliamentary democracies is the fact that the executive derives its mandate from and is politically responsible to the legislature. This implies that who forms the government is not determined by an election alone, but is the outcome of a bargaining process among the parties represented in the parliament. Furthermore, it implies that the government may terminate at any ...

Journal: :IEEE Transactions on Mobile Computing 2023

Military drones can be used for surveillance or spying on enemies. They, however, either destroyed captured, therefore photos contained inside them lost revealed to the attacker. A possible solution solve such a problem is adopt Secret Share (SS) techniques split into several sections/chunks and distribute among fleet of drones. The advantages using technique are two folds. Firstly, no single d...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید