نتایج جستجو برای: passive defense

تعداد نتایج: 146155  

2015
Jing Xu

Advanced metering infrastructure (AMI) is the core component in smart grid. Moreover, two-way communication between the user and the power utility is realized through AMI. Composition of AMI is described. AMI security requirements are illustrated. The threats on the smart meters, communications network, and data collector are analyzed, respectively. Passive and active defenses are investigated....

2002
Arturo Casadevall

The potential threat of biological warfare with a specific agent is proportional to the susceptibility of the population to that agent. Preventing disease after exposure to a biological agent is partially a function of the immunity of the exposed individual. The only available countermeasure that can provide immediate immunity against a biological agent is passive antibody. Unlike vaccines, whi...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه الزهراء - دانشکده ادبیات، زبانهای خارجی و تاریخ 1388

عنوان:بازتاب دفاع مقدس در شعر سه بانوی شاعر(طاهره صفارزاده، سپیده کاشانی، سیمین دخت وحیدی) نام ونام خانوادگی:شیرین علیپور پیروزیان رشته تحصیلی:زبان وادبیات فارسی نام استاد راهنما :دکتر مهین پناهی نام استاد مشاور : دکتر مهدی نیک منش زمان دفاع:14/ 7/1388 چکیده موضوع این پژوهش چگونگی بازتاب دفاع مقدس در اشعار سه بانوی شاعر " طاهره صفّارزاده" ، "سپیده کاشانی" و" سیمین دخت وحیدی " است ....

, ,

Introduction: Because if messengers and social networking channels are formed and hosted on foreign service platforms, we will see political, cultural, and so on threats. In this case, the control and monitoring of social emotions and the observation of political currents are out of reach of outsiders and the aliens take over the public opinion by analyzing the content. In the meantime, the cou...

AM Wahile BP Saha KFH Nazeer Ahamed PK Mukherjee V Kumar

There is growing interest in flavonoids for their wide array of biological actions. In neurodegenerative disorders these naturally occurring polyphenolic compounds, are known to inhibit proinflammatory mediators such as in TNF–? and IL-6 in lipopolysaccharide (LPS) stimulated neuronal degeneration, which are associated with Alzheimer’s and Parkinson’s disease. Recent studies on flavonoids have ...

Background and objective: Given the high share of energy production by hydropower plants in Iran and the weaknesses of the resilience and protection model in this area, the importance of providing a model based on concepts such as؛ Expresses dependencies, correlations, risk management and analysis. In this paper, a new method for measuring the resilience of an energy infrastructure is presented...

2011
Jonathan Friedman Henry Herman Newton Truong Mani B. Srivastava Juyao Ivy Dong Dustin Torres

We discuss the development and design of a Biomimetic Electrostatic Imaging (BEI) element for use in a future multichannel imaging instrument. Inspiration for electrostatic sensing is provided by the diverse species of fish that use passive and induced electric fields for hunting, defense, localization, and communication. Designing an electrostatic sensor is not without its challenges. Hardware...

2013
Niels Quack James Ferrara Simone Gambini Sangyoon Han Christopher Keraly Pengfei Qiao Yi Rao Phillip Sandborn Li Zhu Shun-Lien Chuang Eli Yablonovitch Bernhard Boser Connie Chang-Hasnain Ming C. Wu

We present a modular integration platform, combining active and passive photonic devices with CMOS integrated electronics. Based on this integration platform, an integrated Frequency Modulated Continuous Wave (FMCW) Laser Detection and Ranging (LADAR) source chip is being developed. Such a LADAR source chip can be used in miniaturized 3D imaging systems for defense and consumer electronics appl...

2001
Xinyuan Wang Douglas S. Reeves S. Felix Wu

Network-based intrusion has become a serious threat to today’s highly networked information systems, existing intrusion defense approaches such as intrusion prevention, detection, tolerance and response are “passive” in response to network-based intrusions in that their countermeasures are limited to being local to the intrusion target and there is no automated, network-wide counteraction again...

Journal: :Proceedings on Privacy Enhancing Technologies 2022

Abstract Website Fingerprinting (WF) attacks are used by local passive attackers to determine the destination of encrypted internet traffic comparing sequences packets sent and received user a previously recorded data set. As result, WF particular concern privacy-enhancing technologies such as Tor. In response, variety defenses have been developed, though they tend incur high bandwidth latency ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید