نتایج جستجو برای: and military attack
تعداد نتایج: 16841411 فیلتر نتایج به سال:
Abstract—In this paper, we propose a novel multicast network coding protocol that is resilience to jamming attack in a tactical wireless ad hoc network. Wireless communication is prevailed in the tactical field between military agents and vehicles, but it is fragile by jamming attack from an adversary due to the wireless shared medium. A Jammer can easily disturb other wireless communications w...
This article examines the meanings of “attack” in international law. It points out that the term is used in two distinct bodies of that law. First, the term “armed attack” appears in the jus ad bellum, which governs when a State may resort to force as an instrument of its national policy. In that context, it serves as a condition precedent to the resort to force in self-defence pursuant to Arti...
Wireless sensor networks are now widely used in many areas, such as military, environmental, health and commercial applications. In these environments, security issues are extremely important since a successful attack can cause great damage, even threatening human life. However, due to the open nature of wireless communication, WSNs are liable to be threatened by various attacks, especially des...
The wireless sensor node, being a micro electronic device, can only be equipped with a limited power source ( < 0.5 Ahm 1.2 V). In some application scenarios (which is like military area), replenishment of power resources might be impossible. Sensor node lifetime, therefore, shows a strong dependence on battery lifetime. An adversary may compromise some sensor nodes and use them to inject false...
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. These small, low-cost, low-powers, multifunctional sensor nodes can communicate in short distances. There is currently enormous research potential in the field of wireless sensor network security. The major challenge for employing any efficient ...
WSNs can be deployed in harsh environments to fulfill many applications such as military, environmental, health care, remote monitoring and other applications where an attacker can physically capture some of the nodes from network. Adversary first captures all the details of node and can replicate in large number of clones taking network in control. Many distributed solutions have been proposed...
The wireless sensor network has become a hot research area due its wide range of application in military and civilian domain, but as it uses wireless media for communication these are easily prone to security attacks. There are number of attacks on wireless sensor networks like black hole attack, sink hole attack ,Sybil attack ,selective forwarding attacks etc. in this paper we will concentrate...
discussion the prevalence of mtss was relatively lower in this study comparing to other studies on military personnel. it was not probably due to type of military shoes or exercise area surface (none of them were standardized); it could be due to low intensity trainings and the long intervals between training sessions. results data of all the 181 subjects with the mean age of 30.7 ± 4.68 years ...
Following a rocket attack that occurred at Erbil airport in Iraq, President Biden authorised the first use of military force since becoming on 25 February 2021. This was legally justified basis self-defence. On face it this seemed an innocuous justification. Yet, article argues through both downplaying treaty source right self-defence and its express requirement for armed attack, as well promot...
Since the discovery of Iraqs biological weapons program, concern regarding the threat of biological warfare has increased (1). Anthrax immunizations; increased nuclear, biological, and chemical defense training; improved detection systems and protective gear; and increased vigilance have been instituted to protect the military. However, the military is not the only population at risk for biolo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید