نتایج جستجو برای: fake websites

تعداد نتایج: 20685  

Journal: :American Journal of Psychiatry Residents' Journal 2018

Journal: :Journal of Pastoral Care & Counseling: Advancing theory and professional practice through scholarly and reflective publications 2017

Journal: :Nature Physics 2019

Purpose: This study performed with goals of determining the Items in designing and developing the user interface of digital libraries' websites and to determine the best digital libraries' websites and discuss their advantages and disadvantages; to analyze and compare digital libraries' websites in developing countries with those in the developed countries. Methodology: to do so, 50 digital lib...

ژورنال: پیاورد سلامت 2017
زرقانی, مریم, صادقی, طاهره, علی بیک, محمدرضا, محبی, سمیه, محقق, نیلوفر, کوثری, رعنا,

Background and Aim: The application of information technology for the delivery of library services through websites has removed many temporal and spatial limitations. This study aimed to identify the available services and resources on the websites of central libraries at universities of medical sciences in Iran.  Materials & Methods: The population of this descriptive study comprised 36 centr...

Journal: :Perform. Eval. 2015
Myung Woo Lee Ganguk Hwang Sumit Roy

This work seeks to develop an analytical model for the per-node throughput analysis of IEEE 802.11 WLAN networks with hidden nodes by extending Bianchi’s model. With the analytic model we derive the per-node throughput of each node and quantify the impact of hidden nodes on per-node throughput. Through our analysis, we find that nodes having more hidden nodes are likely to have worse throughput...

Journal: :Mobile Information Systems 2017
Zhanyong Tang Yujie Zhao Lei Yang Shengde Qi Dingyi Fang Xiaojiang Chen Xiaoqing Gong Zheng Wang

Evil-Twin is becoming a common attack in smart home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil-Twin attacks all rely on information such as SSIDs, theMAC address of the genuine AP, or network traffic patterns. However, such information can be faked by the attacker, of...

2007
Henriette Elvang Daniel Z. Freedman

The fake supergravity method is applied to 5-dimensional asymptotically AdS spacetimes containing gravity coupled to a real scalar and an abelian gauge field. The motivation is to obtain bulk solutions with R × S3 symmetry in order to explore the AdS/CFT correspondence when the boundary gauge theory is on R × S3. A fake supergravity action, invariant under local supersymmetry through linear ord...

Background and Objectives: Active presence of hospitals on the Internet is becoming a hallmark of hospitals’ commitment to quality healthcare services delivery. For insightful planning towards a strong Internet-based information delivery and communication, there is a need for continuous monitoring of hospital website’s status. Built on this need, this paper provides, for the first time, a ranki...

2014
Shalinda Adikari Kaushik Dutta

Social networks have become an everyday tool in our lives and different social networks have different target groups. Among them LinkedIn is greatly preferred by the people who are in the professional occupations. With the rapid growth of social networks, people tend to misuse them for unethical and illegal conducts. Creation of a fake profile becomes such adversary effect which is difficult to...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید