نتایج جستجو برای: level attack

تعداد نتایج: 1152212  

2005
Sheng-Ya Lin Yong Xiong Jyh-Charn Liu

Resource depletion is a universal indicator of Distributed Denial of Service (DDoS) attacks. In this paper, we propose a ratio based control algorithm for detection and throttling of DDoS attacks. We use the sliding mode control (SMC) control theory to formulate and optimize the traffic control conditions for DDoS defense. A cluster-based control model is developed for the environment of an ope...

Journal: :Journal of International Technology and Information Management 2021

A national catastrophic cyber-attack is coming, just like the unpredictability of an earthquake. This exploratory research looks at related demographics to respond such attack. The responses used were Technology Optimism and Cyber Self-efficacy. studied age, education level, surprise severity attack, gender, prior countermeasures awareness devastation surprise. Self-efficacy showed a significan...

ژورنال: مهندسی دریا 2007
بختیاری نژاد, فیروز, جبارزاده, مهدی,

Transferring patients under critical conditions such as heart attack, stroke or transient ischemic attack (TIA), and head and backbones injuries is very important, specially transportation on sea because of high level of vibration of ship due to the sea waves is very critical. Many injured persons who work on ships or offshore platform with specialist hospitals are under critical dangers of the...

and M. Farahani, M. R. Heidari, M. R. Soltani, M. Taeibi-Rahni,

A series of supersonic wind tunnel tests on an ogive-cylinder body were performed to investigate the pressure distribution, the boundary layer profiles, and the flow visualization at various angles of attack. All tests were conducted in the trisonic wind tunnel of the Imam Hossein University. The theoretical shock angle at different model positions compared well with those we obtained via Schi...

Journal: :iranian journal of child neurology 0
javad akhondian* department of pediatric neurology, ghaem medical center, mashhad university of medical sciences, mashhad, iran farah ashrafzadeh department of pediatric neurology, ghaem medical center, mashhad university of medical sciences, mashhad, iran mehran beiraghi toosi department of pediatric neurology, ghaem medical center, mashhad university of medical sciences, mashhad, iran nargess hashemi department of pediatric neurology, ghaem medical center, mashhad university of medical sciences, mashhad, iran

how to cite this article: akhondian j, ashrafzadeh f, beiraghi toosi m, hashemi n. a rare presentation of neurobrucellosis in a child with recurrent transient ischemic attacks and pseudotumor cerebri (a case report and review of literature). iran j child neurol. 2014 spring; 8(2):65-69.   brucellosis is a multi-system infectious disease that presents with various manifestations and complication...

2012
Jie Wang

Computer network systems are constantly under attack or have to deal with attack attempts. The first step in any network’s ability to fight against intrusive attacks is to be able to detect intrusions when they are occurring. Intrusion Detection Systems (IDS) are therefore vital in any kind of network, just as antivirus is a vital part of a computer system. With the increasing computer network ...

Fatemeh Baghernejad Masoumeh Safkhani, Nasour Bagheri

In this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by Jannati and Falahati (so-called JF). We prove that an adversary can recover key bits of JF protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. In addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...

Journal: :journal of electrical and computer engineering innovations 2014
fatemeh baghernejad nasour bagheri masoumeh safkhani

in this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by jannati and falahati (so-called jf). we prove that an adversary can recover key bits of jf protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. in addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...

اقلیدس, ترانه, نعمتی نیا, محمد صادق, پاینده, علی,

Guess and determine attacks are general attacks on stream ciphers. These attacks are classified into ad-hoc and Heuristic Guess and Determine (HGD) attacks. One of the Advantages of HGD attack algorithm over ad-hoc attack is that it is designed algorithmically for a large class of stream ciphers while being powerful. In this paper, we use auxiliary polynomials in addition to the original equati...

and M. Farahani, M. R. Heidari, M. R. Soltani, M. Taeibi-Rahni,

A series of supersonic wind tunnel tests on an ogive-cylinder body were performed to investigate the pressure distribution, the boundary layer profiles, and the flow visualization at various angles of attack. All tests were conducted in the trisonic wind tunnel of the Imam Hossein University. The theoretical shock angle at different model positions compared well with those we obtained via Schi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید