نتایج جستجو برای: bad mouthing attack

تعداد نتایج: 110943  

2017

The U.S patent system has been under attack for about a decade. One of the main justifications for changing the patent system has centered on the issue of patent quality. According to patent critics, patents are bad or low quality, justifying major changes to the patent examination and review system. I argue that patent quality is a proxy for attacking patent validity, which has a complex histo...

Bad

Journal: :M/C Journal 2005

Journal: :iranian journal of child neurology 0
javad akhondian* department of pediatric neurology, ghaem medical center, mashhad university of medical sciences, mashhad, iran farah ashrafzadeh department of pediatric neurology, ghaem medical center, mashhad university of medical sciences, mashhad, iran mehran beiraghi toosi department of pediatric neurology, ghaem medical center, mashhad university of medical sciences, mashhad, iran nargess hashemi department of pediatric neurology, ghaem medical center, mashhad university of medical sciences, mashhad, iran

how to cite this article: akhondian j, ashrafzadeh f, beiraghi toosi m, hashemi n. a rare presentation of neurobrucellosis in a child with recurrent transient ischemic attacks and pseudotumor cerebri (a case report and review of literature). iran j child neurol. 2014 spring; 8(2):65-69.   brucellosis is a multi-system infectious disease that presents with various manifestations and complication...

Fatemeh Baghernejad Masoumeh Safkhani, Nasour Bagheri

In this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by Jannati and Falahati (so-called JF). We prove that an adversary can recover key bits of JF protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. In addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...

Journal: :IEEE Systems Journal 2021

False data injection attack (FDIA) is a critical cyber-attack that can cause disrupt operations and subsequently blackouts in smart grid networks. Cleverly constructed stealthy false measurement vectors circumvent the bad detector unit mislead state estimation process. This article proposes novel belief propagation (BP)-based algorithm to detect both random stealthy-type FDIAs grids with higher...

Journal: :journal of electrical and computer engineering innovations 2014
fatemeh baghernejad nasour bagheri masoumeh safkhani

in this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by jannati and falahati (so-called jf). we prove that an adversary can recover key bits of jf protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. in addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید