نتایج جستجو برای: and military attack

تعداد نتایج: 16841411  

2012
James Goppert Weiyi Liu Andrew Shull Vincent Sciandra Inseok Hwang Hal Aldridge

Unmanned Aerial Systems (UASs) are currently in wide use in many applications, including surveillance, law enforcement, and a variety of military missions. As these systems are unmanned, they cannot be directly monitored, and cyberattacks can jeopardize the mission, the vehicle, and potentially lives and property. Given the potential severity of the consequences of security breaches, it is impo...

Journal: :Advanced linguistics 2022

The article is focused on the study of grammatical and syntactic features translation English-language military political texts. Due to specific communicative functional orientation, specialized language sphere operates within three styles (official, journalistic scientific). preference for one these varies according topic communication. texts relevant, considering Russian war with Ukraine tens...

2005
Martin R. Stytz Dale E. Lichtblau Sheila B. Banks

The network-centric warfare philosophy is becoming more firmly entrenched in US military doctrine and operations. As a result, the state and trustworthiness of the network and its computational resources are becoming even more important for commanders, particularly as the network itself is becoming an ever more lucrative target for cyber attack. In cyberspace, however, given human limitations a...

2002
Rajani Muraleedharan Lisa Ann Osadciw

Security and privacy plays a vital role in wireless applications such as health monitoring, military and biometric identification systems. Due to the limited resource constraints in wireless sensor network, security in protocols is sacrificed or kept minimal. In this paper, a cross layer protocol is designed to detect denial of service attack imposed on the network by malicious nodes. The Denia...

2012
Harmandeep Singh Gurpreet Singh Manpreet Singh

There are several routing protocols that have been proposed for the possible deployment of MANETs in many fields like military, government and commercial applications. While the routing aspects of MANETs are already well understood but the research activities about the security in MANETs are still at their beginning. This paper focuses on the performance investigation of reactive and proactive ...

1991
Ralph Grishman John Sterling Catherine Macleod

Although the template specifications call for us not to produce templates for non-specific event descriptions, ou r base run did not attempt to filter out such descriptions, in part because the criteria are hard to specify, but mainl y because at our low recall there was a fair chance of missing date or perpetrator information and thus eliminatin g templates incorrectly . However, we made two o...

2011
Harsh Kupwade Patil Joseph Camp Stephen A. Szygenda

Wireless Sensor Networks (WSN) have played a crucial role in many military and civilian applications. However, with the increase in popularity of such networks, the demand for security is also increasing proportionally. The new sophisticated attacks can easily compromise these resource constraint networks such as WSN. In this paper, we propose a location and energy efficient routing scheme usin...

Journal: :Clinical medicine 2004
Michael J World

Postal distribution of anthrax spores in October 2001 in the USA resulted in cases of pulmonary anthrax. In consequence, interest and concern about terrorist attacks on civilian populations using biological weapons have increased, particularly when one recent authoritative assessment suggested that an attack using some form of unconventional weapon on a Western city was 'inevitable'. This artic...

2017
Younsung Choi

Wireless sensor networks are significant technologies in various fields. For example, they are used for monitoring dangerous places, medical and environmental monitoring, and military surveillance. Various studies have focused on the authentication scheme for wireless sensor networks. However, it is difficult to achieve perfect security performance and low overhead. Liu et al. proposed a scheme...

بوالهری, جعفر,

To offer proper services for military personnel with psychiatric disturbances, calls for the application of known fundamental principles of socio-military psychiatry. In this respect, military and public mobilization, active participation of vast majority of people concerning sacred defense and by its very nature, the social vulnerability necessiate a harmonious multidimensional programming cen...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید