نتایج جستجو برای: and military attack
تعداد نتایج: 16841411 فیلتر نتایج به سال:
Unmanned Aerial Systems (UASs) are currently in wide use in many applications, including surveillance, law enforcement, and a variety of military missions. As these systems are unmanned, they cannot be directly monitored, and cyberattacks can jeopardize the mission, the vehicle, and potentially lives and property. Given the potential severity of the consequences of security breaches, it is impo...
The article is focused on the study of grammatical and syntactic features translation English-language military political texts. Due to specific communicative functional orientation, specialized language sphere operates within three styles (official, journalistic scientific). preference for one these varies according topic communication. texts relevant, considering Russian war with Ukraine tens...
The network-centric warfare philosophy is becoming more firmly entrenched in US military doctrine and operations. As a result, the state and trustworthiness of the network and its computational resources are becoming even more important for commanders, particularly as the network itself is becoming an ever more lucrative target for cyber attack. In cyberspace, however, given human limitations a...
Security and privacy plays a vital role in wireless applications such as health monitoring, military and biometric identification systems. Due to the limited resource constraints in wireless sensor network, security in protocols is sacrificed or kept minimal. In this paper, a cross layer protocol is designed to detect denial of service attack imposed on the network by malicious nodes. The Denia...
There are several routing protocols that have been proposed for the possible deployment of MANETs in many fields like military, government and commercial applications. While the routing aspects of MANETs are already well understood but the research activities about the security in MANETs are still at their beginning. This paper focuses on the performance investigation of reactive and proactive ...
Although the template specifications call for us not to produce templates for non-specific event descriptions, ou r base run did not attempt to filter out such descriptions, in part because the criteria are hard to specify, but mainl y because at our low recall there was a fair chance of missing date or perpetrator information and thus eliminatin g templates incorrectly . However, we made two o...
Wireless Sensor Networks (WSN) have played a crucial role in many military and civilian applications. However, with the increase in popularity of such networks, the demand for security is also increasing proportionally. The new sophisticated attacks can easily compromise these resource constraint networks such as WSN. In this paper, we propose a location and energy efficient routing scheme usin...
Postal distribution of anthrax spores in October 2001 in the USA resulted in cases of pulmonary anthrax. In consequence, interest and concern about terrorist attacks on civilian populations using biological weapons have increased, particularly when one recent authoritative assessment suggested that an attack using some form of unconventional weapon on a Western city was 'inevitable'. This artic...
Wireless sensor networks are significant technologies in various fields. For example, they are used for monitoring dangerous places, medical and environmental monitoring, and military surveillance. Various studies have focused on the authentication scheme for wireless sensor networks. However, it is difficult to achieve perfect security performance and low overhead. Liu et al. proposed a scheme...
To offer proper services for military personnel with psychiatric disturbances, calls for the application of known fundamental principles of socio-military psychiatry. In this respect, military and public mobilization, active participation of vast majority of people concerning sacred defense and by its very nature, the social vulnerability necessiate a harmonious multidimensional programming cen...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید