-
2001
Research on cloud-based traffic adaptive command and control method for mobile botnet
Published 2014-11-01“…Botnet is a serious attack evolved from traditional malwares.With the rapid development of computing capability and mobile Internet access technology,building a realistic mobile botnet has become a potential threat.An adaptive traffic control mechanism for cloud-based mobile botnet was proposed.It adopts different traffic consumption strategies according to different 3G or Wi-Fi network environments.Then scheduling algorithms to execute botnet commands was applied.The experimental results show the traffic adaptive algorithm can improve the stealthy and efficiency of mobile botnet while ensure that the botnet commands can be executed effectively.…”
Get full text
Article -
2002
Prime Field ECDSA Signature Processing for Reconfigurable Embedded Systems
Published 2011-01-01“…Growing ubiquity and safety relevance of embedded systems strengthen the need to protect their functionality against malicious attacks. Communication and system authentication by digital signature schemes is a major issue in securing such systems. …”
Get full text
Article -
2003
Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing
Published 2014-01-01“…To recover the 80-bit secret key of PRINTcipher-48, our attack requires 2 47 related-key chosen plaintexts with a computational complexity of 2 60 · 62 . …”
Get full text
Article -
2004
Research on DNS authoritative server’s performance and security
Published 2006-01-01“…Comparing with the top-level domains(TLD) such as the root servers,the local authoritative servers were more vulnerable to device failures and malicious attacks.It was described the existence of authoritative servers and presented a novel domain measurement tool named DNSAuth to collect the information of local authoritative servers automatically.Experiments to the real-life authoritative servers were conducted which highlighting three important aspects: the distribution,the geographic location and their impacts on performance and security.According to five representative attributes,the authoritative servers of China Top100 websites were evaluated and the result shows that only 32% of all the servers act better in performance and security.…”
Get full text
Article -
2005
Anopheles gambiae phagocytic hemocytes promote Plasmodium falciparum infection by regulating midgut epithelial integrity
Published 2025-02-01“…Abstract For successful transmission, the malaria parasite must traverse tissue epithelia and survive attack from the insect’s innate immune system. Hemocytes play a multitude of roles in mosquitoes, including defense against invading pathogens. …”
Get full text
Article -
2006
Diencephalic Syndrome: A Rare Entity with Its Anaesthetic Management and Post-operative Complications of Diabetes Insipidus and Thrombocytopenia
Published 2022-08-01“…The authors here describe a case of an 8-year-old 10 kg emaciated child who presented with headache, vomiting, rage attacks, decreased weight, and diminution in vision. …”
Get full text
Article -
2007
Review of HEVC video encryption technology
Published 2024-07-01“…The development history of video coding technology was reviewed, and the HEVC standard was introduced. Common attack methods on video encryption technology and performance evaluation indicators were discussed. …”
Get full text
Article -
2008
Efficient ID-based multicast authentication protocol in wireless sensor networks
Published 2009-01-01“…In order to overcome the drawback of the existent multicast authentication protocol in WSN,the PKC-based services for WSN was explored and an efficient ID-based multicast authentication protocol was presented.The protocol with message recovery provided the feature that the message was recoverable from the signature and hence the computa-tional cost and communication overhead of the protocol had been reduced greatly.This protocol was proved secure against existential forgery under adaptive chosen message and ID attack in the random oracle model.The performance analysis results show that the proposed scheme can effectively reduce resource cost,adapt the characteristics of WSN and is clearly superior to the HESS,Zhang and BLS protocols.…”
Get full text
Article -
2009
ASIC3: A Lactic Acid Sensor for Cardiac Pain
Published 2001-01-01“…Other examples of vasoocclusive pain include the acute pain of heart attack and the intermittent pains that accompany sickle cell anemia and peripheral artery disease. …”
Get full text
Article -
2010
New specific migraine prevention: monoclonal antibodies against calcitonin gene-related peptide and its receptor
Published 2019-12-01“…During the last decade, blocking calcitonin gene-related peptide (CGRP) has emerged as a possible mechanism for preventing migraine attacks, and monoclonal antibodies against CGRP and its receptor for the specific migraine prophylaxis have been developed. …”
Get full text
Article -
2011
Algebraic Cryptanalysis Scheme of AES-256 Using Gröbner Basis
Published 2017-01-01“…Analysis shows that the complexity of our scheme is lower than that of the exhaustive attack.…”
Get full text
Article -
2012
Érosion des normes et avenir des institutions états-uniennes
Published 2018-09-01“…This article shows how the system of checks and balances put in place by the Founding fathers failed to stop the many attacks by President Donald Trump against the rule of law in general and more specifically the liberty of the press and the independence of the judiciary (including law enforcement). …”
Get full text
Article -
2013
Squash Bug, Anasa tristis (DeGeer) (Insecta: Hemiptera: Coreidae)
Published 2002-08-01“… The squash bug, Anasa tristis, attacks cucurbits (squash and relatives) throughout Central America, the United States, and southern Canada. …”
Get full text
Article -
2014
Equipment network management security of electrical power PTN
Published 2015-12-01“…In order to solve the problem that the power PTN equipment management system vulnerable to be attacked and vulnerability,the risk factors of electric power PTN equipment network management system were proposed based on the architecture of PTN equipment network management system.From the factors of economic,security and maintenance efficiency,the network deployment of equipment network management system based on MPLS-VPN power data communication network was proposed.The out-band and in-band DCN security deployment plan of province-level,city-level and country-level was put forward.Finally,the boundary security program was proposed for the interaction between the PTN equipment network management system and other systems.…”
Get full text
Article -
2015
INSTRUMENTS OF GOVERNANCE IN THE INDIGENOUS USAKEDET SOCIETY, 1895 – 1977
Published 2022-05-01“…Also, the sustenance and maintenance of law and orders with the intention to impact the people’s ways of life for the purposesof nation-building, development and protection of the society from both external and internal attacks, constant communication with the ancestors and socio-ethical trainings. …”
Get full text
Article -
2016
Censorship or the Limits of Representation in Terrence McNally’s Gay Theatre at the End of the 20th Century
Published 2013-11-01“…By detailing the ways these two plays were attacked by politicians and conservative religious groups, it becomes apparent that censorship is still at the heart of American democracy as is manifested by the ferocious debates around free speech as a result of the conservative revolution. …”
Get full text
Article -
2017
Rummaging Through the Ashes: 9/11 American Poetry and the Transcultural Counterwitness
Published 2020-06-01“…By drawing on current definitions of testimonial witnessing, this study returns to the attacks of September 11th to explore how two 9/11 poems, “First Writing Since (Poem on Crisis of Terror)” by Suheir Hammad and “Alabanza: In Praise of the Local 100” by Martin Espada, challenge the pervasive patriotism of mainstream journalism through acts of transcultural counterwitnessing. …”
Get full text
Article -
2018
Sensitivity Analysis of Transonic Flow over J-78 Wings
Published 2015-01-01“…3D transonic flow over swept and unswept wings with an J-78 airfoil at spanwise sections is studied numerically at negative and vanishing angles of attack. Solutions of the unsteady Reynolds-averaged Navier-Stokes equations are obtained with a finite-volume solver on unstructured meshes. …”
Get full text
Article -
2019
Nematode Management for Bedding Plants
Published 2014-02-01“…Due to warm temperatures, sandy soil, and humidity, Florida has more than its fair share of pests and pathogens that attack bedding plants. Plant-parasitic nematodes can be among the most damaging and hard-to-control of these organisms. …”
Get full text
Article -
2020
Ballot initiatives and the national debate on immigration
Published 2012-01-01“…As of 1996 new laws related to immigration and access to welfare benefits followed the main guidelines of Proposition 187; since the 9-11 attacks national security has become the main axis of immigration laws. …”
Get full text
Article