نتایج جستجو برای: attack

تعداد نتایج: 80818  

and M. A. Masoumnia, H. Momeni, J. Heirani Nobari,

The six-degree equations of flight in their classic form do not provide a proper physical perception due to a number of interferences. Nor do they render visible the important role of attack angles. In this study, attempts have been made to develop a complete set of 3D acceleration equations from the equations of normal and tangential acceleration αN=vωv, αt=v ̇. For this purpose, a coordinate s...

A. Akbari A. Patooghy E. Aerabi M. Fazeli M. Kaykha

Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. T...

Journal: :isecure, the isc international journal of information security 0
e. aerabi m. kaykha m. fazeli a. patooghy a. akbari

embedded systems are becoming a suggestive target for code injection attacks in recent years. software protection mechanisms in general computers are not usually applicable in embedded systems as they come with limited resources like memory and processor. in this paper we investigate side channel characteristics of embedded systems and their usability in code injection attack detection. the arc...

Intrusion Detection Systems (IDSs) are security tools widely used in computer networks. While they seem to be promising technologies, they pose some serious drawbacks: When utilized in large and high traffic networks, IDSs generate high volumes of low-level alerts which are hardly manageable. Accordingly, there emerged a recent track of security research, focused on alert correlation, which ext...

Journal: :Indian Journal of Computer Science and Engineering 2021

The Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys. This leads to the possibility of enhancing the security in environments where these errors can be common, such as biometrics storage systems. Although several researchers have provided implementations, we find that the scheme is vulnerable to attacks when not properly used. This paper describes an attack on t...

ژورنال: :تحقیقات حقوقی 0
جبار اصلانی دانشگاه تهران امیرحسین رنجبریان دانشگاه تهران

چکیده رشد فزاینده تکنولوژی در حوزه اطلاعات و ارتباطات، تهدیدهایی نیز به دنبال داشته است که حمله سایبری نمونه بارز چنین تهدیدی محسوب میگردد. تبعات چنین حملاتی به حدی جدی است که بازیگران بین المللی به ویژه دولتها را جهت اتخاذ رویه های مناسب و مواضع سیاسی-حقوقی به تکاپو واداشته است. مهم ترین چالش فراروی این موضوع مسئله مفهوم شناسی و تعریف حمله سایبری و لزوم تبیین و تعیین دایره مفهومی این پدیده است...

Journal: :American Journal of Public Health 2010

Journal: :Emerging Infectious Diseases 2004

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید