نتایج جستجو برای: spying operation

تعداد نتایج: 211944  

Journal: :IEEE Pervasive Computing 2014
Mary Baker Justin Manweiler

Published by the IEEE CS n 1536-1268/14/$31.00 © 2014 IEEE W elcome to the latest column of Notes from the Community. We start by thanking Jason Hong for his past authorship of this column and introducing Justin Manweiler as the new department coeditor. Members of our Reddit community submitted many fascinating items this quarter. This issue’s topics include the various ways we try to translate...

2007
O. Savry Florian Pebay-Peyroula F. Dehmas G. Robert Jacques Reverdy

RFID applications do not always use encryption to ensure the security as public key cryptographic algorithms that are costly in term of computing resources. We proposed to secure the communication from an ISO 14443 RFID card to the reader against passive eavesdropping at the physical layer by adding noise. During the card reply, the reader generates an appropriate noise that is modulated by the...

Journal: :Bulletin of the American Society for Information Science and Technology 2005

Journal: :University of Michigan Journal of Law Reform 2022

The United States government has been spying on its citizens through a massive surveillance infrastructure that is unrestricted to particular target or suspicion of wrongdoing. statutory and regulatory authorities responsible for this are sprawling often secret. Built-in limitations oversight mechanisms riddled with loopholes inaccessible due exceedingly high thresholds. Litigation challenges o...

2003
JOHN A. GEORGE CHRIS A. WALLACE

-Political redistricting involves the amalgamation of a large number of geographic or statistical units into a smaller set of electoral districts such that the districts satisfy various criteria prescribed by law, judicial mandate, or historical precedent. This paper describes a network-based optimization model that is currently being used by governmental decision-makers in New Zealand to assis...

Journal: :IJCIP 2010
Tyler Moore

Economics puts the challenges facing cybersecurity into perspective better than a purely technical approach does. Systems often fail because the organizations that defend them do not bear the full costs of failure. For instance, companies operating critical infrastructures have integrated control systems with the Internet to reduce near-term, measurable costs while raising the risk of catastrop...

2015
Benjamin Johnson Aron Laszka Jens Grossklags

Increasing concern about insider threats, cyber-espionage, and other types of attacks which involve a high degree of stealthiness has renewed the desire to better understand the timing of actions to audit, clean, or otherwise mitigate such attacks. However, to the best of our knowledge, the modern literature on games shares a common limitation: the assumption that the cost and effectiveness of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید