نتایج جستجو برای: attack aware

تعداد نتایج: 156044  

Journal: :acta medica iranica 0
mojtaba chardoli department of emergency medicine, haftom-e-tir hospital, iran university of medical sciences, tehran, iran. nader h. firoozabadi department of emergency medicine, haftom-e-tir hospital, iran university of medical sciences, tehran, iran. mohsen nouri department of neurosurgery, razi hospital, zahedan university of medical sciences, zahedan, iran. vafa rahimi-movaghar sina trauma and surgery research center, tehran university of medical sciences, tehran, iran.

cerebrovascular attack (cva) and transient ischemic attack (tia) are major causes of emergency department visits around the globe. a significant number of these patients may experience repeat attacks if left untreated. several risk stratifying scoring systems have been developed in recent years to point out the high risk patients. abcd 2 is based on age, blood pressure, clinical status, diabete...

Journal: :journal of advances in computer research 2012
sajjad jahanbakhsh gudakahriz shahram jamali mina vajed khiavi

mobile ad hoc networks (manets) are composed of mobile stations communicating through wireless links, without any fixed backbone support. in these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. tora is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it doesn’...

Journal: :Journal of dermatology and dermatitis 2021

Wearing mask was encouraged to prevent dispersal of droplets and reduce the risks environmental contamination by COVID-19 during pandemic. However, we noticed a rise in initial attack, relapse or exacerbation flushing among general population due long-time wearing. In this manuscript, reported characters mask-related flushing, attempted explain reasons put forward some precautions for that. We ...

An experimental study was performed to investigate the effects of the body angle of attack on the tail surface pressure distribution for a half body-tail combination in subsonic flow. The results show, in small deflection angle regions, that the tail deflection has the same effect on the surface pressure as the body angle of attack. However at moderate to high deflections, the flowfiled caused ...

Journal: :Telecom 2022

Most networks strive to provide good security and an acceptable level of performance. Quality service (QoS) plays important role in the performance a network. Mobile ad hoc (MANETs) are decentralized self-configuring type wireless MANETs generally challenging provision QoS becomes huge challenge. Many researchers literature have proposed parallel mechanisms that investigate either or QoS. This ...

Journal: :IEEE Access 2021

This work presents efficient connection provisioning techniques mitigating high-power jamming attacks in spectrally-spatially flexible optical networks (SS-FONs) utilizing multicore fibers. High-power are modeled based on their impact the lightpaths’ quality of transmission (QoT) through inter-core crosstalk. Based a desired threshold lightpath’s QoT, modulation format used, length path, as wel...

Journal: :IACR transactions on cryptographic hardware and embedded systems 2022

In this paper, a deep-learning based power/EM analysis attack on the state-of-the-art RSA–CRT software implementation is proposed. Our method applied to side-channel-aware with Gnu Multi-Precision (MP) Library, which typical open-source library. MP employs fixed-window exponentiation, fastest in constant time, and loads entire precomputation table once avoid side-channel leaks from multiplicand...

Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...

Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...

Journal: :IEEE Transactions on Network and Service Management 2021

Defenders fighting against Advanced Persistent Threats need to discover the propagation area of an adversary as quickly possible. This discovery takes place through a phase incident response operation called Threat Hunting, where defenders track down attackers within compromised network. In this article, we propose formal model that dissects and abstracts elements attack, from both attacker def...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید