نتایج جستجو برای: defense strategy
تعداد نتایج: 415439 فیلتر نتایج به سال:
Infections with Salmonella enterica belong to the most prominent causes of food poisoning and infected fruits and vegetables represent important vectors for salmonellosis. Although it was shown that plants raise defense responses against Salmonella, these bacteria persist and proliferate in various plant tissues. Recent reports shed light into the molecular interaction between plants and Salmon...
We study the stability of random scale-free networks to degree-dependent attacks. We present analytical and numerical results to compute the critical fraction p_{c} of nodes that need to be removed for destroying the network under this attack for different attack parameters. We study the effect of different defense strategies, based on the addition of a constant number of links on network robus...
Abstract With the continuous increase of wind power permeability, dynamic behavior system also changes, which has a great impact on setting low-frequency load-shedding scheme. The original scheme no good adaptability to high-permeability power. So, this article analyzes principles turbines in grid frequency control. This paper expounds principle strategy configuration. Connecting with actual op...
Although adopted by many cryptocurrencies, the Bitcoin mining protocol is not incentive-compatible, as the selfish mining strategy enables a miner to gain unfair mining rewards. Existing defenses either demand fundamental changes to block validity rules or have little effect on an attacker with more than one third of the total mining power. This paper proposes an effective defense mechanism aga...
The cultural defense has been the subject of a great deal of recent scholarship. Much of this analysis has concerned the consequences of the cultural defense, both for defendants and victims. Scholars differ on what these unintended consequences may be, however, and identify effects ranging from encouraging American ideals to spreading racism, to legitimizing violence against women. Although se...
-A Distributed denial of service (DDoS) attack uses multiple machines operating in concern to attack a network or site. It is the most important security problem for IT managers. These attacks are very simple organized for intruders and hence so disruptive. The detection and defense of this attack has specific importance among network specialists. In this paper a new and smart taxonomy of DDoS ...
Mass media as a means to disseminate news has independence in publication regarding the company's target that depends on latest developments or trending topics. Total defense requires structuring strategy needs involvement delivering public part of element forming an opinion. This study aims provide overview critical role participation supporting government various activities disseminating info...
While it is important to develop effective worm defense techniques, most previous work has focused on a single point in the design space. The sheer complexity and size of the design space of worm defense requires a more systematic study of the design space. We give the first systematic investigation of the design space of worm defense system strategies. We accomplish this by providing a taxonom...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید