نتایج جستجو برای: absorbed dos
تعداد نتایج: 147908 فیلتر نتایج به سال:
Application features like port numbers are used by Network-based Intrusion Detection Systems (NIDSs) to detect attacks coming from networks. System calls and the operating system related information are used by Host-based Intrusion Detection Systems (HIDSs) to detect intrusions toward a host. However, the relationship between hardware architecture events and Denial-of-Service (DoS) attacks has ...
Solar-induced chlorophyll fluorescence (SIF), which can be used as a novel proxy for estimating gross primary production (GPP), can be effectively retrieved using ground-based, airborne and satellite measurements. Absorbed photosynthetically active radiation (APAR) is the key bridge linking SIF and GPP. Remotely sensed SIF at the canopy level (SIFcanopy) is only a part of the total SIF emission...
This paper analyzes the DoS attack traffic on the WiBro network, generates logs and tracebacks the attacker. With attaining the integrity against the packets resulted from the malicious DoS attack, the paper provides the framework to generating forensic data. In the WiBro network environment, the attacker and the victim are the WiBro mobile terminal. The packet analyzers(Cain & Abel, Wireshark ...
We study theoretically the local density of states (DOS) in a topological Josephson junction. We show that the well-known 4π Josephson effect originates from the interference effect between two Majorana fermions (MFs) that are localized at the Josephson junction. In addition, the DOS for electrons (holes) shows the 4π interference information along each parity conserved energy spectrum. The DOS...
In the networking systems the flow of information is the most important service. It is clear that a simple self-propagating worm can quickly spread across the Internet and cause severe damage to our society. Facing this great security threats like Denial-of-Service (DoS), we need to build an early detection system that can detect the presence of a worm in the Internet as quickly as possible in ...
We initiate study of the use of ‘secure tunnel’ protocols, specifically IPsec, and its availability and performance guarantees to higher-layer protocols, in particular TCP, against Denial/Degradation of Service (DoS) attacks. IPsec is designed to provide privacy and authentication against MITM attackers, and employs an anti-replay mechanism to ensure performance. For our analysis, we define a n...
background: this study assessed the clinical usefulness of the solid phantom, which may compensate for the disadvantages of the water phantom, by comparing the radiological doses between the two depending on their depths. materials and methods: the experimental equipment used was a linear accelerator for medical use, water phantom, solid phantom, farmer type ion chamber and electrometer. the di...
In this article the subject of DoS vulnerabilities of cryptographic key establishment and authentication protocols is discussed. The system for computer-aided DoS protocol resistance analysis, which employs the Petri nets formalism and Spin model-checker, is presented.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید