نتایج جستجو برای: attack
تعداد نتایج: 80818 فیلتر نتایج به سال:
nowadays, we live in a world which quality, speed, accuracy and cost are the most important parameters in parts' design and manufacturing. due to the complexity of part manufacturing, traditional and nontraditional manufacturing techniques are used. aerodynamic tests usually requires one or several models for testing in wind tunnels and these models typically have particular complexities in whi...
background: stroke, one of the most important causes of morbidity and mortality in the world, is of great importance in young adults (15-45 years), amongst whom the causes of stroke and transient ischemic attack (tia) are different from those in older ages and a significant portion of them have no known etiology. patent foramen ovale (pfo) is considered a probable cause in this group. methods: ...
In cloud computing, multiple users can share the same physical machine that can potentially leak secret information, in particular when the memory de-duplication is enabled. Flush+Reload attack is a cache-based attack that makes use of resource sharing. T-table implementation of AES is commonly used in the crypto libraries like OpenSSL. Several Flush+Reload attacks on T-table implementat...
Deep neural networks are vulnerable to adversarial examples, even in the black-box setting where attacker is only accessible model output. Recent studies have devised effective attacks with high query efficiency. However, such performance often accompanied by compromises attack imperceptibility, hindering practical use of these approaches. In this article, we propose restrict perturbations a sm...
To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...
for better management of asthma it is essential that patients adjust their treatment according to the medical plan developed by the health care professionals. to achieve this goal, patients should assess the severity of their disease regularly. the purpose of this study was to determine the effect of regular measurement of peak expiratory flow and patient education on self management of asthma....
روش های موجود برای احرازهویت با توجه به ذخیره تصاویر عنبیه برای مرحله تطبیق، باعث نقض حریم خصوصی افراد و لورفتن ویژگی بیومتریک آنان می شود. الگوریتم پیشنهادی راهکاری برای استفاده از تصاویر بدست آمده از عنبیه برای تولید یک کلید موقت برای عنبیه کاربر و استفاده از ویژگی های عنبیه چشم او و ترکیب آنها برای تولید یک کپسول بیومتریک جهت احرازهویت می باشد. این کار با استفاده از عنبیه های دو چشم کاربر و...
IntroductionChildren with severe asthma attack are a challenging group of patients who could be difficult to treat and leading to significant morbidity and mortality. Asthma attack severity is qualitatively estimated as mild, moderate and severe attacks and respiratory failure based on conditions such as respiration status, feeling of dyspnea, and the degree of unconsciousness. part of which ar...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید