نتایج جستجو برای: attack aware
تعداد نتایج: 156044 فیلتر نتایج به سال:
Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...
Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...
The blades of wind turbines are the most important parts in producing power output. In this study, a section of a 660 KW wind turbine blade will be installed in Iran in near future was tested in a wind tunnel. In addition to steady tests, various unsteady tests including the effects of reduced frequency, mean angle of attack, and amplitudes were carried out. The preliminary results show strong ...
We propose heading-aware methods of generating search result snippets of web pages. A heading is a brief description of the topic of its associated sentences. Some existing methods give priority to sentences containing many words that also appear in headings when selecting sentences to be included in snippets with limited length. However, according to our observation, words in heading are very ...
Phenomena in the performance behaviour of high-performance computing (HPC) applications can stem from the HPC system itself, from the application’s code, but also from the simulation domain. In order to analyse the latter phenomena, we propose a system that visualizes profile-based performance data in its spatial context, i.e., on the geometry, in the simulation domain. It thus helps HPC expert...
Interrupting users engaged in tasks typically has negative effects on their task completion time, error rate, and affective state. Empirical research has shown that these negative effects can be mitigated by deferring interruptions until more opportune moments in a user’s task sequence. However, existing systems that reason about when to interrupt do not have access to models of user tasks that...
Richard Prestons The Cobra Event, which he dedicates to public health professionals, weaves a chilling, but compelling tale about a lone terrorists attack on Manhattan with a genetically engineered virus. Prestons thought-provoking novel raises a logical question: How do we successfully contain and combat the threat of bioterrorism? To meet this emerging threat, we must address four importan...
background: previous literatures have shown a transient ischemic attack (tia) mimic rate of 9-31%. we aimed to ascertain the proportion of stroke mimics amongst suspected tia patients. methods: a prospective observational study was performed in ghaem hospital, mashhad, iran during 2012-2013. consecutive tia patients were identified in a stroke center. the initial diagnosis of ...
The blades of wind turbines are the most important parts in producing power output. In this study, a section of a 660 KW wind turbine blade will be installed in Iran in near future was tested in a wind tunnel. In addition to steady tests, various unsteady tests including the effects of reduced frequency, mean angle of attack, and amplitudes were carried out. The preliminary results show strong ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید