نتایج جستجو برای: attacking afghanistan

تعداد نتایج: 9950  

Journal: :سیاست 0
عباس منوچهری دانشگاه تربیت مدرس صفورا مزاری دانشگاه تربیت مدرس

the ninth constitution of afghanistan (1382 /2003) was ratified according to the bone agreement and with a democratic orientation. this paper compares the principles of this constitution with principles of two models of liberal democracy. for this purpose, five indexes have been used for our analysis: the view on man, the notion of right, political system, democracy, and the process for the act...

2007
GF Sondre Rønjom Tor Helleseth

We consider the filter generator over GF (2) consisting of a linear feedback shift register of length k that generates a maximal length linear sequence of period 2 − 1 over GF (2) and a Boolean function of degree d that combines bits from one element in the shift register (considered as an element in GF (2)) and creates a binary output bit zt at any time t. We show how to extend a recent attack...

2012
Yossi Gilad Amir Herzberg

We show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and site spoofing/defacement attacks, without requiring vulnerabilities in either web-browser or server, and circumventing known defenses. The attacks are practical and require a puppet (malicious script in browser sandbox) running on a victim client machine, and an attacke...

2009
Sven Türpe Andreas Poller Jan Steffan Jan-Peter Stotz Jan Trukenmüller

We discuss five attack strategies against BitLocker, which target the way BitLocker is using the TPM sealing mechanism. BitLocker is a disk encryption feature included in some versions of Microsoft Windows. It represents a state-of-the-art design, enhanced with TPM support for improved security. We show that, under certain assumptions, a dedicated attacker can circumvent the protection and brea...

2005
D Bruschi L Cavallaro A Lanzi M Monga

We describe a flaw which we individuated in the Object-Independent Authorization Protocol (OIAP), an authorization protocol which represents one of the building blocks of the Trusted Platform Module (TPM), the core of the Trusted Computing Platform (TP) as devised by the Trusted Computing Group (TCG) standards. In particular we show that the protocol fails to protect messages exchanges against ...

2012
Rainer Böhme Matthias Kirchner H. T. Sencar

This chapter discusses counter-forensics, the art and science of impeding or misleading forensic analyses of digital images. Research on counter-forensics is motivated by the need to assess and improve the reliability of forensic methods in situations where intelligent adversaries make efforts to induce a certain outcome of forensic analyses. Counter-forensics is first defined in a formal decis...

Journal: :The International journal of health planning and management 2016
Qudratullah Ahmadi Homayoon Danesh Vasil Makharashvili Kathryn Mishkin Lovemore Mupfukura Hillary Teed Maggie Huff-Rousselle

This case study analyzes the design and implementation of the Basic Package of Health Services (BPHS) in Afghanistan by synthesizing the literature with a focus on maternal health services. The authors are a group of graduate students in the Brandeis University International Health Policy and Management Program and Sustainable International Development Program who used the experience in Afghani...

2014

Afghanistan sits on the junction between the Indo-Australasian and Eurasian crustal plates and is composed of a series of terranes (Figure 1) that broke away from the main Gondwana supercontinent before colliding with and being accreted on to the Eurasian plate. The accretionary events began in the Cretaceous and have continued until recent times. The Herat or Hari Rod fault, which runs E-W acr...

Journal: : 2023

This article aims to examine the electoral results of two Afghan political groups in former and post-Taliban periods Afghanistan. The study's main objective is evaluate victories Social Democratic Party (Afghan Mellat) Jamiat-e Islami Afghanistan (the Islamic Society Afghanistan). Basic, deductive, comparative analysis used study, which mostly conducted by examining primary secondary data that ...

Journal: :Journal of traumatic stress 2010
Eric Kuhn Kent Drescher Josef Ruzek Craig Rosen

Aggressive and unsafe driving was examined in 474 male veterans receiving Veterans Affairs residential treatment for posttraumatic stress disorder (PTSD). Specifically, the authors evaluated if PTSD was associated with aggressive and unsafe driving and if Iraq and Afghanistan War veterans were at higher risk than other war veterans. Approximately two thirds of the sample reported lifetime aggre...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید