نتایج جستجو برای: spying operation

تعداد نتایج: 211944  

2014
Charles Hutchins Holger Ballweg Shelly Knotts Jonas Hummel Antonio Roberts

Government spying on internet traffic has become ubiquitous. Not to be left out, the private sector tracks our online footprint via web beacons and cookies. Web services such as Google track our progress as we surf the net and click on links. The Mozilla plugin, Lightbeam (formerly Collusion), shows the user a visual map of every site to which a surfer’s data is sent. An interconnected web of a...

Journal: :Chemical senses 2005
O G Almeida A Miranda P Frade P C Hubbard E N Barata A V M Canário

Despite the high degree of social organization and complex behaviour of many cichlids, little is known about the role of chemical communication in these fish. The Mozambique tilapia is a maternal mouth-brooding cichlid; territorial males congregate in leks and are actively sought by ripe females. When approached by a female, males display a range of well-characterized behaviours such as nestdig...

Journal: :Security and Communication Networks 2012
Do-Hoon Kim Taek Lee Jaewoo Kang Hyunchoel Jeong Hoh Peter In

Botnets are a disastrous threat because they execute malicious activities such as distributed denial-of-service, spam email, malware downloads (such as eggdownloads), and spying by exploiting zombie PCs under their control. Botnets infect PCs on a huge scale by initially scanning the service ports of vulnerable applications for the purpose of propagation, which is leveraged as the size of the b...

Journal: :The Journal of Kartal Training and Research Hospital 2012

1993
T. F. Lunt D. E. Denning R. R. Schell M. Heckman

We characterized the information in a multilevel state of the world that is captured by a multilevel relational database. Based on the characterization, we formalized the security semantics of tuple-level and element-level data classiication schemes. Entity and referential integrity constraints for the multilevel relational model are derived from the security semantics. We also showed that the ...

Journal: :TRANSACTIONS OF THE JAPAN SOCIETY OF MECHANICAL ENGINEERS Series C 1991

Journal: : 2023

Abstract— Malware in general and botnets particular are big threats to cybersecurity. They have many sophisticated methods bypass security systems infect computers perform attacks, sabotage, or spying activities. Botnet detection solutions always focused on solved by scientists cybersecurity specialists. The DGA botnet is a group of common families that share the same mechanism needing connect ...

2018
Etienne Toffin Edith Gabriel Marceau Louis Jean-Louis Deneubourg Jean-Claude Grégoire

Bark beetles use aggregation pheromones to promote group foraging, thus increasing the chances of an individual to find a host and, when relevant, to overwhelm the defences of healthy trees. When a male beetle finds a suitable host, it releases pheromones that attract potential mates as well as other 'spying' males, which result in aggregations on the new host. To date, most studies have been c...

Journal: :I. J. Network Security 2013
M. Uma G. Padmavathi

The role of computers and the Internet in modern society is well recognized. Recent developments in the fields of networking and cyberspace have greatly benefited mankind, but the rapid growth of cyberspace has also contributed to unethical practices by individuals who are bent on using the technology to exploit others. Such exploitation of cyberspace for the purpose of accessing unauthorized o...

Journal: :Drones 2023

With the strengths of quickness, low cost, and adaptability, unmanned aerial vehicle (UAV) communication is widely utilized in next-generation wireless network. However, some risks hidden dangers such as UAV “black flight” disturbances, attacks, spying incidents lead to necessity real-time supervision UAVs. A compressed sensing-based genetic Markov localization method proposed this paper for tw...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید