نتایج جستجو برای: dos response
تعداد نتایج: 1103583 فیلتر نتایج به سال:
Background. This retrospective study aimed to assess the efficacy and toxicities of second-line chemotherapy with irinotecan, leucovorin, and 5-fluorouracil (5-FU) in metastatic gastric cancer (MGC) patients previously treated with docetaxel and S-1 with or without oxaliplatin (DS/DOS). Patients and Methods. We reviewed the data of patients who had previously been treated with first-line DS/DOS...
The effect of impurities on quantum chemical parameters of single-walled nanotubes (SWNTs) was studied using density functional theory (DFT). The density of states (DOS), Fermi energy and thermodynamic energies of (5,5) carbon nanotubes were calculated in the presence of nitrogen impurity. It was found that this nanotube remains metallic after being doped with one nitrogen atom. The partial den...
Users and providers increasingly disagree on what Denial of Service (DoS) is. For example, an ISP might consider large multimedia downloads an attack to overload its infrastructure or have it pay high interconnection fees. On the other hand, a user will certainly consider selective bandwidth reduction that is used by ISPs as a countermeasure, as a DoS measure. Given the nature of their business...
Performance Comparison of Host Identity Protocol and TCP/IP with Firewall against Denial of Services
Host Identity Protocol (HIP) is a new kind of Internet protocol which has been developed to resolve the existing problems of Internet protocol TCP/IP. As a new protocol HIP provides many advantages compared to TCP/IP such as in the aspect of security and mobility. Unfortunately, the deployability rate of HIP was still low. One of the reason is because particular solution for currently Internet ...
Increased generation of reactive oxygen species (ROS) and low levels of antioxidants may cause morbidity in premature infants on supplemental oxygen. Glutathione (GSH)-dependent antioxidant systems protect against ROS, and regenerating GSH from GSH disulfide (GSSG) by the flavoenzyme GSH reductase (GR) is essential for the optimal function of this system. Previously, we have observed enhanced r...
This paper presents a new vulnerability assessment model based on timing attacks. In particular, it examines the problem where an adversary has access to a certain sensor reading or a controller output signal in real time, but can only cause denial of service (DoS). Jamming the communications to a device can cause the system to work with stale data that, in turn, could interfere with the contro...
One mechanism used by receptor tyrosine kinases to relay a signal to different downstream effector molecules is to use adaptor proteins that provide docking sites for a variety of proteins. The daughter of sevenless (dos) gene was isolated in a genetic screen for components acting downstream of the Sevenless (Sev) receptor tyrosine kinase. Dos contains a N-terminally located PH domain and sever...
1Research Fellow, Department of Dental Materials and Prosthodontics, São José dos Campos Dental School, São Paulo State University, São José dos Campos, SP, Brazil. 2DDS, PhD student, Department of Dental Materials and Prosthodontics, São José dos Campos Dental School, São Paulo State University, São José dos Campos, SP, Brazil. 3DDS, DMD, PhD student, Dental Materials and Prosthodontics, Arara...
Di ver sos ti pos de po li es ti re no mo di fi ca dos fo ram ob ti dos atra vés da po li me ri za ção por en xer tia (graft poly me ri za ti on) de es ti re no na pre sen ça dos se guin tes mo di fi ca do res: co po lí me ro de eti le no-acetato de vi ni la (EVA); po li e ti le no de ba i xa den si da de (PE) e po li bu ta di e no (PB). Os mo di fi ca do res fo ram uti li za dos em se pa ra do...
The Denial of service (DoS) and Distributed Denial of Service (DDoS) attacks are aimed at maliciously consuming the available resources in computing systems to prevent genuine users from legitimately accessing them. These attacks can easily interrupt or disable targeted systems, so it is important for the system to detect and filter bogus connection requests as early as possible. Many common pr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید