نتایج جستجو برای: حمله dos

تعداد نتایج: 130450  

2001
Carlos Alberto Ferreira Bispo Edson Walmir Cazarini

O objetivo princzpal deste artigo e" fer com que todos, sejam os acade^micos ou Os empresa rios ou aLnda os consumz.dores, compreendam o cena"rz-o atual e possam ter, pelo menos, uma percep50 minx'ma dos rumos qu_e as empresas, as tecnoLogz"as e o mercado consumidor tonzara-o nos pr6xz"mos anos. Para aLcanor o obj~etino deste artigo, mostra-Se o resultado de um estudo onde e" avaliado como as e...

1999
I.C.P. Fortes P. J. Baugh

Estudos pirolíticos dos óleos vegetais das partes (endocarpo mais mesocarpo e epicarpo) do fruto da Macauba (Acrocomia sclerocarpa M.) foram realizados sob atmosfera de hélio usando-se um pirolisador de filamento modelo Girdel 75 -Py -1, conectado diretamente a um CG/EM. Os experimentos foram realizados em diferentes temperaturas e tempos de pirólise, para avaliar como estes parâmetros afetam o...

2013
J. Bertomeu J. Puigdollers J. Andreu

One of the most interesting aspects of amorphous semiconductor multilayers is their application in studying the interfaces between different a-Si:H based alloys, because of the great number of interfaces that a multilayer structure can contain. There are several magnitudes, such as the additional hydrogen content at interfaces [1,2] or the density of states (DOS) per interface [3-7] that can be...

Journal: :The Journal of antibiotics 1980
T Fujiwara Y Takahashi K Matsumoto E Kondo

A new aminoglycoside antibiotic, S-11-A, was isolated from the fermentation broth of the 2-deoxystreptamine negative (DOS-) mutant of Bacillus circulans S-11. The structure of S-11-A was elucidated as 1-deamino-1-hydroxyxylostasin, which contains an intermediate of DOS biosynthesis (S-11-P) and has resistance to some aminoglycoside-inactivating enzymes. This is the first finding of antibiotic p...

Journal: :Journal of Computer Security 2005
Jarmo Mölsä

This tutorial describes what Denial of Service (DoS) attacks are, how they can be carried out in IP networks, and how one can defend against them. Distributed DoS (DDoS) attacks are included here as a subset of DoS attacks. A DoS attack has two phases: a deployment and an attack phase. A DoS program must first be deployed on one or more compromised hosts before an attack is possible. Mitigation...

2009

RESUMO: As helmintoses gastrintestinais constituem um dos principais fatores limitantes para a ovinocaprinocultura em todo o mundo e a saúde dos rebanhos depende de um efetivo controle antiparasitário. A resistência aos anti-helmínticos representa um dos entraves para esse controle e a busca por novas bases tem sido um desafio constante. A utilização da fitoterapia na medicina veterinária const...

2004
Jason Reid Andrew J. Clark Juan Manuel González Nieto Jason Smith Kapali Viswanathan

In this paper we investigate denial of service (DoS) vulnerabilities in Voice over IP (VoIP) systems, focusing on the ITU-T H.323 family of protocols. We provide a simple characterisation of DoS attacks that allows us to readily identify DoS issues in H.323 protocols. We also discuss network layer DoS vulnerabilities that affect VoIP systems. A number of improvements and further research direct...

Journal: :Science 2016
Boris P Koch Kerstin B Ksionzek Oliver J Lechtenfeld S Leigh McCallister Philippe Schmitt-Kopplin Jana K Geuer Walter Geibert

Although sulfur is an essential element for marine primary production and critical for climate processes, little is known about the oceanic pool of nonvolatile dissolved organic sulfur (DOS). We present a basin-scale distribution of solid-phase extractable DOS in the East Atlantic Ocean and the Atlantic sector of the Southern Ocean. Although molar DOS versus dissolved organic nitrogen (DON) rat...

2011
Godwin Ansa Haitham S. Cruickshank Zhili Sun

Denial of Service (DOS) attacks are a major threat faced by all types of networks. The effect of DOS in a delay tolerant network (DTN) is even more aggravated due to the scarcity of resources. Perpetrators of DOS attacks in DTN-like environments look beyond the objective of rendering a target node useless. The aim of an attacker is to cause a network-wide degradation of resources, service and p...

2000
D. H. Neuhaus

The density of states (DOS) of crystalline silicon changes with the introduction of dopants due to the formation of an impurity band and band tails. Until now, the DOS of undoped silicon has been used to model silicon devices, regardless of the doping level. This approximation may not be satisfactory for the emitter and back surface field regions of silicon solar cells. Therefore, we measured t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید