نتایج جستجو برای: dos response

تعداد نتایج: 1103583  

2016
Jitendra R. Patil Manish Sharma

Wireless sensors are very small embedded devices with low memory, low computing power and low battery life. Various applications such as continuous connectivity, weather monitoring, industry and instantly -deployable communication for first responders and armed. These networks already consider environmental conditions, factory performance, and troop deployment, to name some applications. Wirele...

Journal: :IJWMC 2007
Jason Smith Suratose Tritilanunt Colin Boyd Juan Manuel González Nieto Ernest Foo

Denial of Service (DoS) attacks are an increasing problem for network connected systems. Key establishment protocols are applications that are particularly vulnerable to DoS attack as they are typically required to perform computationally expensive cryptographic operations in order to authenticate the protocol initiator and to generate the cryptographic keying material that will subsequently be...

1999
Kanta Matsuura

|Key-agreement protocol will play an important role as an entrance to secure communication over the Internet. Speci cally, ISAKMP(Internet Security Association and Key Management Protocol)/Oakley key-agreement is currently a leading approach for communication between two parties. Basic idea of ISAKMP/Oakley is an authenticated Di eHellman (DH) key-agreement protocol. This authentication owes a ...

2012
Cyrill Bannwart

Denial-of-service (DoS) attacks have become a major threat to current systems and networks in the Internet. Yet the existing infrastructure is rarely tested for potential damage caused by (D)DoS attacks because no method exist to audit a productive system without flooding and thus risking system outages and resulting losses. Having a method that does (D)DoS attack auditing without requiring the...

Journal: :Nepalese journal of ophthalmology : a biannual peer-reviewed academic journal of the Nepal Ophthalmic Society : NEPJOPH 2013
K F Monsudi A A Ayanniyi A H Balarabe

INTRODUCTION Destructive ocular surgery (DOS) means eye loss. An audit of its indications would be useful in reducing its incidence. OBJECTIVE To determine indications for destructive ocular surgeries. MATERIALS AND METHODS The case records (files) of all the patients who had DOS in a tertiary health facility in Nigeria from January 2004 to December 2011 were reviewed retrospectively. The i...

Journal: :Fertility and sterility 2009
Natasha M Godard Budhan S Pukazhenthi David E Wildt Pierre Comizzoli

OBJECTIVE To better characterize cumulus-oocyte interactions during oocyte maturation and fertilization in the cat model. DESIGN Experimental in vitro study. SETTING Smithsonian Institution. ANIMAL(S) Domestic shorthair cats. INTERVENTION(S) Groups of denuded oocytes (DOs) and cumulus-oocyte complexes (COCs) were subjected to in vitro maturation (with or without FSH and LH, with or with...

Journal: :RITA 2015
Guilherme Chagas Kurtz Gustavo Stangherlin Cantarelli Michele Rorato Sagrillo Fernando Gomes Pires

Resumo: Muitas anomalias e doenças genéticas podem ser descobertas através da análise da forma e das características morfológicas dos cromossomos. Para alcançar este objetivo, geralmente constrói-se o cariótipo, a partir de uma fotografia obtida através de um microscópio, através da organização e ordenação dos cromossomos de uma célula humana de acordo com o seu tamanho. Apesar dos grandes avan...

Journal: :Archivum immunologiae et therapiae experimentalis 1993
A M Waaga M Krzymański K Ulrichs B Wierusz-Wysocka W Müller-Ruchholtz

Since systematic hematological studies on blood and bone marrow changes after treatment with 15-Deoxyspergualin (DOS) are lacking, a quantitative assessment was performed fourteen or twenty eight days after intraperitoneal application of DOS to rats. Further observations done 7 and 14 days after discontinuation of DOS administration allowed analysis of bone marrow regeneration. DOS induced lymp...

2012
Kai Wang Jia Chen Huachun Zhou

Content-Centric Networking (CCN) is a novel networking paradigm making named data the first class entity rather than IP address. That is, it cares about which data to fetch rather than which host to reach. One key feature of CCN is the content caching that CCN routers are caching named contents instead of IP addresses, which makes the effect of Denial-of-Service (DoS) attack different from in T...

2018
Hongguo Cao Yani Bian Fei Zhang Yunshu Tang Caixia Li Jiemei Chen Xiaorong Zhang

OBJECTIVE cAMP and mature promoting factor (MPF) play critical roles during the maturation of mammalian oocytes. The aim of this study was to produce the offspring from denuded oocytes (DOs) in mice by regulating cAMP and MPF. METHODS In this study, we used DOs at the germinal vesicle (GV) stage in mice and regulated levels of cAMP and MPF in DOs by adding Forskolin and PD166285 during in vit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید