نتایج جستجو برای: attack

تعداد نتایج: 80818  

and A. Bakhshalipour, M. R. Soltani, M. Seddighi,

The blades of wind turbines are the most important parts in producing power output. In this study, a section of a 660 KW wind turbine blade will be installed in Iran in near future was tested in a wind tunnel. In addition to steady tests, various unsteady tests including the effects of reduced frequency, mean angle of attack, and amplitudes were carried out. The preliminary results show strong ...

Journal: :acta medica iranica 0
mojtaba chardoli department of emergency medicine, haftom-e-tir hospital, iran university of medical sciences, tehran, iran. nader h. firoozabadi department of emergency medicine, haftom-e-tir hospital, iran university of medical sciences, tehran, iran. mohsen nouri department of neurosurgery, razi hospital, zahedan university of medical sciences, zahedan, iran. vafa rahimi-movaghar sina trauma and surgery research center, tehran university of medical sciences, tehran, iran.

cerebrovascular attack (cva) and transient ischemic attack (tia) are major causes of emergency department visits around the globe. a significant number of these patients may experience repeat attacks if left untreated. several risk stratifying scoring systems have been developed in recent years to point out the high risk patients. abcd 2 is based on age, blood pressure, clinical status, diabete...

An experimental study was performed to investigate the effects of the body angle of attack on the tail surface pressure distribution for a half body-tail combination in subsonic flow. The results show, in small deflection angle regions, that the tail deflection has the same effect on the surface pressure as the body angle of attack. However at moderate to high deflections, the flowfiled caused ...

Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...

Cooperative Spectrum Sensing (CSS) is an effective approach to overcome the impact of multi-path fading and shadowing issues. The reliability of CSS can be severely degraded under Byzantine attack, which may be caused by either malfunctioning sensing terminals or malicious nodes. Almost, the previous studies have not analyzed and considered the attack in their models. The present study introduc...

Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...

Journal: :Karbala international journal of modern science 2022

Organisations and governments constantly face potential security attacks. However, the need for next-generation cyber defence has become even more urgent in a day age when attack surfaces that hackers can exploit have grown at an alarming rate with increase number of devices are connected to Internet. As such, relies on predictive analysis is proactive than existing technologies rely intrusion ...

In the biclique attack, a shorter biclique usually results in less data complexity, but at the expense of more computational complexity. The early abort technique can be used in partial matching part of the biclique attack in order to slightly reduce the computations. In this paper, we make use of this technique, but instead of slight improvement in the computational complexity, we keep the amo...

Recently, Baghery et al. [1, 2] presented some attacks on two RFID protocols, namely Yoon and Jung et al. protocols, and proposed the improved version of them. However, in this note, we show that the improved version of the Jung et al. protocol suffers from desynchronization attack and the improved version of the Yoon's protocol suffers from secret disclosure attack. The succe...

Journal: :journal of communication engineering 0
mohammad ehdaie parsa sharif research center nikolaos alexiou kth panos papadimitratos kth

sybil attacks pose a serious threat for wireless sensor networks (wsn) security. they can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. in a sybil attack,the attacker masquerades as multiple sensor identities, that are actually controlled by one or a few existing attacker nodes. sybil identities are fabricated out of stolen keys, obt...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید