نتایج جستجو برای: spying operation
تعداد نتایج: 211944 فیلتر نتایج به سال:
Government spying on internet traffic has become ubiquitous. Not to be left out, the private sector tracks our online footprint via web beacons and cookies. Web services such as Google track our progress as we surf the net and click on links. The Mozilla plugin, Lightbeam (formerly Collusion), shows the user a visual map of every site to which a surfer’s data is sent. An interconnected web of a...
Despite the high degree of social organization and complex behaviour of many cichlids, little is known about the role of chemical communication in these fish. The Mozambique tilapia is a maternal mouth-brooding cichlid; territorial males congregate in leks and are actively sought by ripe females. When approached by a female, males display a range of well-characterized behaviours such as nestdig...
Botnets are a disastrous threat because they execute malicious activities such as distributed denial-of-service, spam email, malware downloads (such as eggdownloads), and spying by exploiting zombie PCs under their control. Botnets infect PCs on a huge scale by initially scanning the service ports of vulnerable applications for the purpose of propagation, which is leveraged as the size of the b...
We characterized the information in a multilevel state of the world that is captured by a multilevel relational database. Based on the characterization, we formalized the security semantics of tuple-level and element-level data classiication schemes. Entity and referential integrity constraints for the multilevel relational model are derived from the security semantics. We also showed that the ...
Abstract— Malware in general and botnets particular are big threats to cybersecurity. They have many sophisticated methods bypass security systems infect computers perform attacks, sabotage, or spying activities. Botnet detection solutions always focused on solved by scientists cybersecurity specialists. The DGA botnet is a group of common families that share the same mechanism needing connect ...
Bark beetles use aggregation pheromones to promote group foraging, thus increasing the chances of an individual to find a host and, when relevant, to overwhelm the defences of healthy trees. When a male beetle finds a suitable host, it releases pheromones that attract potential mates as well as other 'spying' males, which result in aggregations on the new host. To date, most studies have been c...
The role of computers and the Internet in modern society is well recognized. Recent developments in the fields of networking and cyberspace have greatly benefited mankind, but the rapid growth of cyberspace has also contributed to unethical practices by individuals who are bent on using the technology to exploit others. Such exploitation of cyberspace for the purpose of accessing unauthorized o...
With the strengths of quickness, low cost, and adaptability, unmanned aerial vehicle (UAV) communication is widely utilized in next-generation wireless network. However, some risks hidden dangers such as UAV “black flight” disturbances, attacks, spying incidents lead to necessity real-time supervision UAVs. A compressed sensing-based genetic Markov localization method proposed this paper for tw...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید