نتایج جستجو برای: attack

تعداد نتایج: 80818  

Journal: :journal of computer and robotics 0
hamid farhadi school of science and eng., sharif university of technology (international campus), kish, iran behzad akbari department of electrical and computer eng., tarbiat modares university, tehran, iran shahab rajaee school of science and eng., sharif university of technology (international campus), kish, iran mohammad farahani school of science and eng., sharif university of technology (international campus), kish, iran

recently, peer-to-peer (p2p) networks contribute to a large fraction of the internet backbone traffic. consequently, misusing such networks for malicious purposes is a potential side effect. in this review article, we investigate different techniques of misusing p2p overlay networks to launch large-scale next-generation distributed denial of service (ddos) attacks. in particular, we investigate...

Journal: :iranian journal of nursing and midwifery research 0
marzieh momennasab marzieh moattari abbas abbaszade babak shamshiri

background: life-threatening and stressful events, such as myocardial infarction (mi) can lead to an actual crisis, which affects the patients spiritually as well as physically, psychologically, and socially. however, the focus of health care providers is on physical needs. furthermore, the spirituality of the patients experiencing heart attack in the light of our cultural context is not well a...

Simulation of an underwater glider to investigate the effect of angle of attack on the hydrodynamic coefficients such as lift, drag, and torque. Due to the vital role of these coefficients in designing the controllers of a glider and to obtain an accurate result, this simulation has been studied at a range of operating velocities. The total length of the underwater glider with two wings is 900 ...

Journal: :IEEE Access 2021

In recent years, there has been an increase in the number of phishing attacks targeting people fields defense, security, and diplomacy around world. particular, hacking attack group Kimsuky conducting to collect key information from public institutions since 2013. The main feature techniques used by are conceal malicious code e-mails disguised as normal spread a document file that is vulnerable...

Journal: :The American Journal of Pathology 2012

Journal: :Journal of General Internal Medicine 2013

Journal: :Nature 1991

Journal: :BMJ 2007

Journal: :Index on Censorship 1998

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید