نتایج جستجو برای: interception rate

تعداد نتایج: 964247  

2016

Recent reports have highlighted incidents of massive Internet traffic interception executed by rerouting BGP paths across the globe (affecting banks, governments, entire network service providers, etc.). The potential impact of these attacks can range from massive eavesdropping to identity spoofing or selective content modification. In addition, executing such attacks does not require access or...

Journal: :CoRR 2013
Tejaswi Agarwal Mike A. Leonetti

Proxy servers are being increasingly deployed at organizations for performance benefits; however, there still exists drawbacks in ease of client authentication in interception proxy mode mainly for Open Source Proxy Servers. Technically, an interception mode is not designed for client authentication, but implementation in certain organizations does require this feature. In this paper, we focus ...

Journal: :Biology letters 2012
Sanne Kjellerup Thomas Kiørboe

Small cruising zooplankton depend on remote prey detection and active prey capture for efficient feeding. Direct, passive interception of prey is inherently very inefficient at low Reynolds numbers because the viscous boundary layer surrounding the approaching predator will push away potential prey. Yet, direct interception has been proposed to explain how rapidly cruising, blind copepods feed ...

2007
P. K. Menon S. S. Vaddi Ernest J. Ohlmeyer

A game-theoretic approach to the design of robust integrated guidance-control system for a moving-mass actuated kinetic warhead is presented. Feedback linearized form of the kinetic warhead dynamics and a high-order target model are used in the formulation. Nonlinear feedback solution to the robust finite-horizon target interception problem is derived using the recently developed multi-stepping...

2012
Yossi Gilad Amir Herzberg

We show that fragmented IPv4 and IPv6 traffic is vulnerable to effective interception and denial-of-service (DoS) attacks by an off-path attacker. Specifically, we demonstrate a weak attacker intercepting more than 80% of the data between peers and causing over 94% loss rate. We show that our attacks are practical through experimental validation on popular industrial and opensource products, wi...

Journal: :Philosophical transactions of the Royal Society of London. Series B, Biological sciences 2016
Eliane A Honda Giselda Durigan

Woody encroachment due to changes in climate or in the disturbance regimes (fire and herbivory) has been observed throughout the savannah biome over the last century with ecological, hydrological and socioeconomic consequences. We assessed changes in tree density and basal area and estimated changes in rain interception by the canopies across a 5-year period over a biomass gradient in Cerrado v...

Journal: :International Journal of Information Technologies and Systems Approach 2023

This paper proposed a study on computer network information security and protection strategy based big data environment. The research purpose was to use technology seek more efficient technology. algorithm in this article time-series detection data, which could improve the early warning rate of abnormal information, reduce time, accuracy interception virus information. results effectively show ...

Journal: :Journal of nuclear medicine : official publication, Society of Nuclear Medicine 1991
H R Ham A Piepsz

This work was undertaken to look for distribution volume-plasma clearance converting equations(s) that can be used to estimate glomerular filtration rate (GFR) in children. GFR calculated using the two-blood sample slope-intercept method was used for comparison. It was shown that the 2-hr distribution volume and the two-blood sample clearance were closely related. For all the age groups, the co...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید