نتایج جستجو برای: and military attack
تعداد نتایج: 16841411 فیلتر نتایج به سال:
This paper presents case studies of attacks aimed at tactical software defined radios based on a classification with the most common sources of vulnerabilities, classes of attacks, and types of intrusions that military radio sets may suffer. Besides that, we also describe how attack mitigation strategies can impact the development of SDR infrastructures. By using such approach, we identify seve...
The intentional release of biological agents by belligerents or terrorists is a possibility that has recently attracted increased attention. Law enforcement agencies, military planners, public health officials, and clinicians are gaining an increasing awareness of this potential threat. From a military perspective, an important component of the protective pre-exposure armamentarium against this...
background: blood neutrophil to lymphocyte ratio (nlr) and mean platelet volume (mpv) both have been used as a simple marker of inflammation in many disorders. here, we aimed to investigate the relationship between nlr, mpv, and familial mediterranean fever (fmf). materials and methods: in this retrospective study, the fi les of fmf patients in pediatric rheumatology outpatient clinic were revi...
Wireless sensor networks (WSN) are widely developed to monitor different phenomena in a variety of areas including nature, medical centers, home automation, industrial and military applications. Such development in many different fields, raises important security issues related to the reliability of the WSNs. Due to the resource constrained nature of the WSNs, these networks are the target of m...
Some forty years ago, the U.S. Armed Forces began a revolution in military affairs based largely on the exploitation of information. A series of advances in position location, accurate munitions guidance, multi-spectral surveillance, data fusion and, most importantly, network connectivity resulted in a new type of military. Success in modern war of any character, scale or intensity, is increasi...
Mobile ad hoc networks (MANETs) are extensively used in military and civilian applications. The dynamic topology of MANETs allows nodes to join and leave the network at any point of time. This generic characteristic of MANET has rendered it vulnerable to security attacks. In our research, we will address the problem of black hole attack. In this attack, a malicious node falsely advertise shorte...
In a tactical field, wireless communication is prevailed among military agents and vehicles, but it is fragile by jamming attack from an adversary because of the wireless shared medium. Jamming attack is easily achieved by emitting continuous radio signal and it can interfere with other radio communications within the network. Channel switching over multiple channels or route detouring have bee...
Wireless sensor network is an area where there has been alot of significant developments. These sensors are hugely utilized in many applications like military applications, home automation, and environment surveillance. An application where confidential data is being transmitted requires to be protected from different types of attacks. Though the nodes are authenticated, they are liable to get ...
Background: Today, one of the effective ways of providing services is contracting with outside of organization and outsourcing. Objective: The current study aimed to investigate effect of outsourcing on performance of nutrition unit in studied hospitals. Methods: The current descriptive – analytical study performed in 2013, in two non-military hospitals and two military hospitals. 602 patien...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید