Showing 2,001 - 2,020 results of 3,648 for search '"Attacker"', query time: 0.05s Refine Results
  1. 2001

    Research on cloud-based traffic adaptive command and control method for mobile botnet by Wei CHEN, Shi-wen ZHOU, Cheng-yu YIN

    Published 2014-11-01
    “…Botnet is a serious attack evolved from traditional malwares.With the rapid development of computing capability and mobile Internet access technology,building a realistic mobile botnet has become a potential threat.An adaptive traffic control mechanism for cloud-based mobile botnet was proposed.It adopts different traffic consumption strategies according to different 3G or Wi-Fi network environments.Then scheduling algorithms to execute botnet commands was applied.The experimental results show the traffic adaptive algorithm can improve the stealthy and efficiency of mobile botnet while ensure that the botnet commands can be executed effectively.…”
    Get full text
    Article
  2. 2002

    Prime Field ECDSA Signature Processing for Reconfigurable Embedded Systems by Benjamin Glas, Oliver Sander, Vitali Stuckert, Klaus D. Müller-Glaser, Jürgen Becker

    Published 2011-01-01
    “…Growing ubiquity and safety relevance of embedded systems strengthen the need to protect their functionality against malicious attacks. Communication and system authentication by digital signature schemes is a major issue in securing such systems. …”
    Get full text
    Article
  3. 2003

    Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing by Yuseop Lee, Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong

    Published 2014-01-01
    “…To recover the 80-bit secret key of PRINTcipher-48, our attack requires 2 47 related-key chosen plaintexts with a computational complexity of 2 60 · 62 . …”
    Get full text
    Article
  4. 2004

    Research on DNS authoritative server’s performance and security by WANG Yao, HU Ming-zeng, YUN Xiao-chun, LI Bin, YAN Bo-ru

    Published 2006-01-01
    “…Comparing with the top-level domains(TLD) such as the root servers,the local authoritative servers were more vulnerable to device failures and malicious attacks.It was described the existence of authoritative servers and presented a novel domain measurement tool named DNSAuth to collect the information of local authoritative servers automatically.Experiments to the real-life authoritative servers were conducted which highlighting three important aspects: the distribution,the geographic location and their impacts on performance and security.According to five representative attributes,the authoritative servers of China Top100 websites were evaluated and the result shows that only 32% of all the servers act better in performance and security.…”
    Get full text
    Article
  5. 2005

    Anopheles gambiae phagocytic hemocytes promote Plasmodium falciparum infection by regulating midgut epithelial integrity by Victor Cardoso-Jaime, George Dimopoulos

    Published 2025-02-01
    “…Abstract For successful transmission, the malaria parasite must traverse tissue epithelia and survive attack from the insect’s innate immune system. Hemocytes play a multitude of roles in mosquitoes, including defense against invading pathogens. …”
    Get full text
    Article
  6. 2006

    Diencephalic Syndrome: A Rare Entity with Its Anaesthetic Management and Post-operative Complications of Diabetes Insipidus and Thrombocytopenia by Sakshi Kadian, Sarin John, Siddharth Chakraborty, Sanjay Agrawal

    Published 2022-08-01
    “…The authors here describe a case of an 8-year-old 10 kg emaciated child who presented with headache, vomiting, rage attacks, decreased weight, and diminution in vision. …”
    Get full text
    Article
  7. 2007

    Review of HEVC video encryption technology by YE Qing, LIU Xiaobing, RONG Li, HE Junfei, ZHANG Qiaojia

    Published 2024-07-01
    “…The development history of video coding technology was reviewed, and the HEVC standard was introduced. Common attack methods on video encryption technology and performance evaluation indicators were discussed. …”
    Get full text
    Article
  8. 2008

    Efficient ID-based multicast authentication protocol in wireless sensor networks by WANG Gang1, WEN Tao1, GUO Quan2, MA Xue-bin1

    Published 2009-01-01
    “…In order to overcome the drawback of the existent multicast authentication protocol in WSN,the PKC-based services for WSN was explored and an efficient ID-based multicast authentication protocol was presented.The protocol with message recovery provided the feature that the message was recoverable from the signature and hence the computa-tional cost and communication overhead of the protocol had been reduced greatly.This protocol was proved secure against existential forgery under adaptive chosen message and ID attack in the random oracle model.The performance analysis results show that the proposed scheme can effectively reduce resource cost,adapt the characteristics of WSN and is clearly superior to the HESS,Zhang and BLS protocols.…”
    Get full text
    Article
  9. 2009

    ASIC3: A Lactic Acid Sensor for Cardiac Pain by D.C. Immke, E.W. McCleskey

    Published 2001-01-01
    “…Other examples of vasoocclusive pain include the acute pain of heart attack and the intermittent pains that accompany sickle cell anemia and peripheral artery disease. …”
    Get full text
    Article
  10. 2010

    New specific migraine prevention: monoclonal antibodies against calcitonin gene-related peptide and its receptor by K. Ryliškienė, D. Jatužis, A. Vaitkus

    Published 2019-12-01
    “…During the last decade, blocking calcitonin gene-related peptide (CGRP) has emerged as a possible mechanism for preventing migraine attacks, and monoclonal antibodies against CGRP and its receptor for the specific migraine prophylaxis have been developed. …”
    Get full text
    Article
  11. 2011

    Algebraic Cryptanalysis Scheme of AES-256 Using Gröbner Basis by Kaixin Zhao, Jie Cui, Zhiqiang Xie

    Published 2017-01-01
    “…Analysis shows that the complexity of our scheme is lower than that of the exhaustive attack.…”
    Get full text
    Article
  12. 2012

    Érosion des normes et avenir des institutions états-uniennes by Anne Deysine

    Published 2018-09-01
    “…This article shows how the system of checks and balances put in place by the Founding fathers failed to stop the many attacks by President Donald Trump against the rule of law in general and more specifically the liberty of the press and the independence of the judiciary (including law enforcement). …”
    Get full text
    Article
  13. 2013

    Squash Bug, Anasa tristis (DeGeer) (Insecta: Hemiptera: Coreidae) by John L. Capinera

    Published 2002-08-01
    “… The squash bug, Anasa tristis, attacks cucurbits (squash and relatives) throughout Central America, the United States, and southern Canada. …”
    Get full text
    Article
  14. 2014

    Equipment network management security of electrical power PTN by Yun LIU, Guojun LIU, Jianwei REN, Jian LI

    Published 2015-12-01
    “…In order to solve the problem that the power PTN equipment management system vulnerable to be attacked and vulnerability,the risk factors of electric power PTN equipment network management system were proposed based on the architecture of PTN equipment network management system.From the factors of economic,security and maintenance efficiency,the network deployment of equipment network management system based on MPLS-VPN power data communication network was proposed.The out-band and in-band DCN security deployment plan of province-level,city-level and country-level was put forward.Finally,the boundary security program was proposed for the interaction between the PTN equipment network management system and other systems.…”
    Get full text
    Article
  15. 2015

    INSTRUMENTS OF GOVERNANCE IN THE INDIGENOUS USAKEDET SOCIETY, 1895 – 1977 by EDET EFIONG OKON

    Published 2022-05-01
    “…Also, the sustenance and maintenance of law and orders with the intention to impact the people’s ways of life for the purposesof nation-building, development and protection of the society from both external and internal attacks, constant communication with the ancestors and socio-ethical trainings. …”
    Get full text
    Article
  16. 2016

    Censorship or the Limits of Representation in Terrence McNally’s Gay Theatre at the End of the 20th Century by Xavier Lemoine

    Published 2013-11-01
    “…By detailing the ways these two plays were attacked by politicians and conservative religious groups, it becomes apparent that censorship is still at the heart of American democracy as is manifested by the ferocious debates around free speech as a result of the conservative revolution. …”
    Get full text
    Article
  17. 2017

    Rummaging Through the Ashes: 9/11 American Poetry and the Transcultural Counterwitness by Matthew Moran

    Published 2020-06-01
    “…By drawing on current definitions of testimonial witnessing, this study returns to the attacks of September 11th to explore how two 9/11 poems, “First Writing Since (Poem on Crisis of Terror)” by Suheir Hammad and “Alabanza: In Praise of the Local 100” by Martin Espada, challenge the pervasive patriotism of mainstream journalism through acts of transcultural counterwitnessing. …”
    Get full text
    Article
  18. 2018

    Sensitivity Analysis of Transonic Flow over J-78 Wings by Alexander Kuzmin

    Published 2015-01-01
    “…3D transonic flow over swept and unswept wings with an J-78 airfoil at spanwise sections is studied numerically at negative and vanishing angles of attack. Solutions of the unsteady Reynolds-averaged Navier-Stokes equations are obtained with a finite-volume solver on unstructured meshes. …”
    Get full text
    Article
  19. 2019

    Nematode Management for Bedding Plants by William T. Crow

    Published 2014-02-01
    “…Due to warm temperatures, sandy soil, and humidity, Florida has more than its fair share of pests and pathogens that attack bedding plants. Plant-parasitic nematodes can be among the most damaging and hard-to-control of these organisms. …”
    Get full text
    Article
  20. 2020

    Ballot initiatives and the national debate on immigration by Mario Menéndez

    Published 2012-01-01
    “…As of 1996 new laws related to immigration and access to welfare benefits followed the main guidelines of Proposition 187; since the 9-11 attacks national security has become the main axis of immigration laws. …”
    Get full text
    Article