نتایج جستجو برای: attack

تعداد نتایج: 80818  

Journal: :iranian journal of child neurology 0
javad akhondian* department of pediatric neurology, ghaem medical center, mashhad university of medical sciences, mashhad, iran farah ashrafzadeh department of pediatric neurology, ghaem medical center, mashhad university of medical sciences, mashhad, iran mehran beiraghi toosi department of pediatric neurology, ghaem medical center, mashhad university of medical sciences, mashhad, iran nargess hashemi department of pediatric neurology, ghaem medical center, mashhad university of medical sciences, mashhad, iran

how to cite this article: akhondian j, ashrafzadeh f, beiraghi toosi m, hashemi n. a rare presentation of neurobrucellosis in a child with recurrent transient ischemic attacks and pseudotumor cerebri (a case report and review of literature). iran j child neurol. 2014 spring; 8(2):65-69.   brucellosis is a multi-system infectious disease that presents with various manifestations and complication...

Fatemeh Baghernejad Masoumeh Safkhani, Nasour Bagheri

In this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by Jannati and Falahati (so-called JF). We prove that an adversary can recover key bits of JF protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. In addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...

Journal: :journal of electrical and computer engineering innovations 2014
fatemeh baghernejad nasour bagheri masoumeh safkhani

in this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by jannati and falahati (so-called jf). we prove that an adversary can recover key bits of jf protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. in addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...

اقلیدس, ترانه, نعمتی نیا, محمد صادق, پاینده, علی,

Guess and determine attacks are general attacks on stream ciphers. These attacks are classified into ad-hoc and Heuristic Guess and Determine (HGD) attacks. One of the Advantages of HGD attack algorithm over ad-hoc attack is that it is designed algorithmically for a large class of stream ciphers while being powerful. In this paper, we use auxiliary polynomials in addition to the original equati...

M. Abadi, S. Jalili,

Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...

Cognitive radio (CR) network is an excellent solution to the spectrum scarcity problem. Cooperative spectrum sensing (CSS) has been widely used to precisely detect of primary user (PU) signals. The trustworthiness of the CSS is vulnerable to spectrum sensing data falsification (SSDF) attack. In an SSDF attack, some malicious users intentionally report wrong sensing results to cheat the fusion c...

Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...

Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...

and A. Bakhshalipour, M. R. Soltani, M. Seddighi,

The blades of wind turbines are the most important parts in producing power output. In this study, a section of a 660 KW wind turbine blade will be installed in Iran in near future was tested in a wind tunnel. In addition to steady tests, various unsteady tests including the effects of reduced frequency, mean angle of attack, and amplitudes were carried out. The preliminary results show strong ...

Journal: :iranian journal of neurology 0
ali noureddine department of neurology, school of medicine, mashhad university of medical sciences, mashhad, iran. kavian ghandehari department of neurology, neuro cognitive research center, school of medicine, mashhad university of medical sciences, mashhad, iran. mohammad taghi shakeri department of social medicine, school of medicine, mashhad university of medical sciences, mashhad, iran.

background: previous literatures have shown a transient ischemic attack  (tia) mimic rate  of 9-31%. we aimed  to ascertain the proportion of stroke mimics amongst suspected tia patients. methods: a prospective observational study was performed in   ghaem   hospital,   mashhad,   iran   during   2012-2013. consecutive tia patients  were identified in a stroke center. the  initial diagnosis  of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید