نتایج جستجو برای: spying operation
تعداد نتایج: 211944 فیلتر نتایج به سال:
The previous I-cache timing attacks on RSA which exploit the instruction path of a cipher were mostly proof-of-concept, and it is harder to put them into practice than D-cache timing attacks. We propose a new trace driven timing attack model based on spying on the whole I-cache. An improved analysis algorithm of the exponent using the characteristic of the size of the window is advanced, which ...
The use of spies in combat, international, and industrial conflict and competition can be critical in obtaining an advantage in the outcome of such a situation. An understanding of the underlying framework of spying is a valuable tool in making decisions involving the use of spies. This paper studies spying in the context of matrix games. We formulate and model a number of situations involving ...
[email protected] D U R I N G T H E P A S T F E W Y E A R S , W E have seen a shift in how systems are being attacked. After a successful compromise, a bot (also referred to as a zombie or drone) is often installed on the system. This small program provides a remote control mechanism to command the victim. Via this remote control mechanism, the attacker is able to issue arbitra...
The present paper investigates the strategic motives that guide the quest for outgroup resources. Resources can be retrieved through spying and requesting help. Whereas both methods are means of obtaining valued resources from the outgroup, spying secures the ingroup’s public image, while requesting help potentially damages this image by displaying the ingroup as incompetent and dependent. Two ...
When fish larvae recruit back to a reef, chemical cues are often used to find suitable habitat or to find juvenile or adult conspecifics. We tested if the chemical information used by larvae was intentionally produced by juvenile and adult conspecifics already on the reef (communication process) or whether the cues used result from normal biochemical processes with no active involvement by cons...
the prominent features of national security in today's world are dimension change and its nature, taking place dramatically and with high speed. in this respect and in comparison to other areas, what is taken place in regard to information technology is more important. havingsecurity in virtual space is an important subject that is recently taken into account in strategic studies. the natu...
Pesticide exposure may contribute to cancer by causing genetic mutations during B cell development. On page 1473, Agopian et al. show that pesticides also increase the rate of precancerous B cell proliferation. Follicular lymphoma is a B cell cancer characterized by a translocation event that occurs as activated B cells undergo AID-driven diversification of their antibody genes in germinal cent...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید