نتایج جستجو برای: spying operation
تعداد نتایج: 211944 فیلتر نتایج به سال:
Published by the IEEE CS n 1536-1268/14/$31.00 © 2014 IEEE W elcome to the latest column of Notes from the Community. We start by thanking Jason Hong for his past authorship of this column and introducing Justin Manweiler as the new department coeditor. Members of our Reddit community submitted many fascinating items this quarter. This issue’s topics include the various ways we try to translate...
RFID applications do not always use encryption to ensure the security as public key cryptographic algorithms that are costly in term of computing resources. We proposed to secure the communication from an ISO 14443 RFID card to the reader against passive eavesdropping at the physical layer by adding noise. During the card reply, the reader generates an appropriate noise that is modulated by the...
The United States government has been spying on its citizens through a massive surveillance infrastructure that is unrestricted to particular target or suspicion of wrongdoing. statutory and regulatory authorities responsible for this are sprawling often secret. Built-in limitations oversight mechanisms riddled with loopholes inaccessible due exceedingly high thresholds. Litigation challenges o...
-Political redistricting involves the amalgamation of a large number of geographic or statistical units into a smaller set of electoral districts such that the districts satisfy various criteria prescribed by law, judicial mandate, or historical precedent. This paper describes a network-based optimization model that is currently being used by governmental decision-makers in New Zealand to assis...
Economics puts the challenges facing cybersecurity into perspective better than a purely technical approach does. Systems often fail because the organizations that defend them do not bear the full costs of failure. For instance, companies operating critical infrastructures have integrated control systems with the Internet to reduce near-term, measurable costs while raising the risk of catastrop...
Increasing concern about insider threats, cyber-espionage, and other types of attacks which involve a high degree of stealthiness has renewed the desire to better understand the timing of actions to audit, clean, or otherwise mitigate such attacks. However, to the best of our knowledge, the modern literature on games shares a common limitation: the assumption that the cost and effectiveness of ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید