Showing 2,221 - 2,240 results of 3,648 for search '"Attacker"', query time: 0.04s Refine Results
  1. 2221

    Market Structure and Competition During Economic Transformation by David Benček, Hannah Rosenbaum, John P. Weche

    Published 2022-11-01
    “…In addition to digitization and climate change, a possible deglobalization is also being discussed in the wake of the COVID 19 pandemic and Russia’s attack on Ukraine. In particular, the disruptions and uncertainties recently observed in international value chains provide an incentive for companies to rethink and restructure supply chains. …”
    Get full text
    Article
  2. 2222

    Quantum Key Relay Scheme Based on Trusted Control Center by Shaosheng Jiang, Ruinan Chi, Xiaojun Wen

    Published 2014-06-01
    “…A transmit quantum key relay scheme based on trusted control center and trusted quantum relay server was proposed.The quantum key one-time pad encryption algorithm was used in the design of trusted relay protocol.Upon the establishment of trusted relay network,the trusted control center was used to ensure the credibility and security of access relay,and the user's IP address was hidden in the quantum information data that had been encrypted only for the legal user to decrypt and transmit credible information.The security analysis shows,users who do not connect with the quantum channel can still use the trusted relay network to transmit quantum key securely in a long-distance transmission while attackers can not obtain useful quantum key information from the network.…”
    Get full text
    Article
  3. 2223

    Quelle éducation morale et civique à l’école ? Pourquoi et comment la mettre en œuvre ? by Gérard Pithon

    Published 2017-12-01
    “…This education serves as a "pedagogical lever" to improve the "living together" threatened by these crises, and most recently by terrorist attacks claimed by a fundamentalist Islamism. The recommendations of the European Union to its member states underline the importance of relational, intercultural and empathic competences as facilitating elements to live together. …”
    Get full text
    Article
  4. 2224

    L’Arlequinade anglaise et la gravure satirique au XVIIIe siècle : Élaboration esthétique et détournement politique by Marc Martinez

    Published 2003-01-01
    “…In the satirical texts of the 1720s, the English pantomime and its emblematic figure, Harlequin, pandered to the xenophobic prejudices that stigmatised foreignness and at the same time fuelled the attacks of literary satirists who exposed the degeneracy of the national stage. …”
    Get full text
    Article
  5. 2225

    Dissections in Phoebe Gloeckner’s A Child’s Life (1998, 2000) by Hélène Tison

    Published 2020-05-01
    “…Phoebe Gloeckner’s anatomical drawings and écorchés, her often blunt and jarring graphic narratives centered on abusive relations, are inevitably controversial; they fly in the face of feminist attacks on such representations as debasing to women and they complexify and redirect the debate about child sexuality. …”
    Get full text
    Article
  6. 2226

    Secure key-sharing algorithm based on smart grid by Wei GU, Jian SHEN, Yongjun REN

    Published 2021-08-01
    “…Most of establishment-key protocols suffer from both session-specific temporary information attack and private key leakage issue.Therefore, a novel public key sharing-based symmetric encryption algorithm (PKS-SE) was proposed, in order to maintain the security of communication between smart meter and service providers.Based on bilinear mapping and super-singular curve, PKS-SE algorithm constructed the communication key between intelligent electricity meter and service provider, in order to avoid the key escrow problem.At the same time, PKS-SE algorithm reduced the number of required messages during the mutual authentication to only two messages, thus controlling the communication cost and operation cost of PKS-SE algorithm.Simulation results show that the proposed PKS-SE algorithm can effectively realize public key-sharing…”
    Get full text
    Article
  7. 2227

    Preparing to Evacuate your Home in Case of an Emergency by Elizabeth B. Bolton

    Published 2003-07-01
    “… During these times of potential terrorist attacks, it is important to plan for the worst and hope that it never happens. …”
    Get full text
    Article
  8. 2228

    Citrus peelminer Marmara gulosa Guillèn and Davis (Insecta: Lepidoptera: Gracillariidae) by Lukasz L. Stelinski

    Published 2013-04-01
    “…This moth is considered native in the United States, attacking willow. It is believed that a host-shift occurred to multiple non-native plants including all varieties of citrus and certain ornamentals, such as oleander. …”
    Get full text
    Article
  9. 2229

    Mauritanie 1956-1963 : les multiples dimensions d’une indépendance contestée by Camille Evrard

    Published 2018-06-01
    “…This contribution looks to improve our knowledge of the tense atmosphere that prevails in this country, target of several attacks between 1956 and 1963, and subject to an imposing military mobilization along its borders with the Spanish Sahara and Algeria at war. …”
    Get full text
    Article
  10. 2230

    Android malware detection method based on deep neural network by Fan CHAO, Zhi YANG, Xuehui DU, Yan SUN

    Published 2020-10-01
    “…Android is increasingly facing the threat of malware attacks.It is difficult to effectively detect large-sample and multi-class malware for traditional machine learning methods such as support vector machine,method for Android malware detection and family classification based on deep neural network was proposed.Based on the comprehensive extraction of application components,Intent Filter,permissions,and data flow,the method performed an effective feature selection to reduce dimensions,and conducted a large-sample detection and multi-class classification for malware based on deep neural network.The experimental results show that the method can conduct an effective detection and classification.The accuracy of binary classification between benign and malicious Apps is 97.73%,and the accuracy of family multi-class classification can reach 93.54%,which is higher than other machine learning algorithms.…”
    Get full text
    Article
  11. 2231

    La réponse sécuritaire de l’administration Bush : l’USA PATRIOT Act et les libertés individuelles by Alice GAIRARD-BERNARD

    Published 2011-09-01
    “…One of the key actions taken by the Bush administration was to push for the adoption of the USA PATRIOT Actin order to address the needs of a country following an unprecedented terrorist attack. While most aspects of the legislation are not controversial, a few sections giving the government greater surveillance powers raise civil liberties issues. …”
    Get full text
    Article
  12. 2232

    Attribute-based proxy signature scheme for unmanned aerial vehicle networks by Lei HE, Jianfeng MA, Dawei WEI

    Published 2021-11-01
    “…It is necessary to use digital signature scheme to protect integrity and authentication of commands sent by command agencies to unmanned aerial vehicle (UAV) in the UAV networks.Moreover, the signature scheme should ensure UAV can receive signature in time and protect privacy of signers.Therefore, an attribute-based proxy signature scheme for UAV networks was proposed and its security was analyzed.The proposed signature scheme has existential unforgeability under selective-attribute and chosen message attacks, and privacy of signers is protected.Its efficiency was analyzed in terms of computation costs and communication costs, and compared with other related signature schemes.The results indicate the proposed signature scheme has less computation costs when its communication costs are at the same level with other signature schemes.…”
    Get full text
    Article
  13. 2233

    La FIJL dans la lutte antifranquiste (1960-1974) by Antoni Rossi Trafach

    Published 2024-09-01
    “…Between 1962 and 1963, young libertarians participated in attacks affecting Spain and Europe, which mainly targeted international tourism and the Franco regime. …”
    Get full text
    Article
  14. 2234

    Joint amplitude and phase partition based physical layer key generation method by Nannan LI, Yu HAN, Ning GAO, Shi JIN

    Published 2021-05-01
    “…A key generation method based on wireless channel physical layer features is of great significance for improving security of wireless transmission.An orthogonal frequency division multiplexing (OFDM) communication system based on time division duplex (TDD) with multipath fading channels was considered.Utilizing the advantages of OFDM multicarrier and the channel reciprocity and combining the phase and amplitude information of channel frequency response (CFR), two algorithms for physical layer key generation were proposed.Theoretical analysis and experimental simulation show that the proposed algorithm has more consistent and smaller overhead in information negotiation, in addition, the proposed algorithm can increase the key length and enhance randomness, and has a better defense capability against eavesdropping and active attacks of the illegal user.…”
    Get full text
    Article
  15. 2235

    Disaster Planning: Important Papers and Documents by Josephine Turner

    Published 2003-06-01
    “…Whether the disaster is a hurricane, tornado or a terrorist attack preparation is the key to survival and to clean up after the event. …”
    Get full text
    Article
  16. 2236

    DGA malicious domain name identification based on XGBoost and particle swarm optimization algorithm by CHEN Zesheng, ZHOU Min, FENG Lichun, CHEN Weijie

    Published 2024-11-01
    “…Domain generation algorithms (DGA) have become a common method of network attacks. To enhance the detection capability for DGA malicious domains, a method for malicious domain identification based on XGBoost and particle swarm optimization (PSO) algorithms was proposed. …”
    Get full text
    Article
  17. 2237

    The prevalence of women sexual locking in a gender violence context - a pastoral perspective by M. E. Baloyi

    Published 2016-12-01
    “…Many taboos and rituals were put in place to ensure that marriage endures for as long as the couple lives. Any attack on marriage was rendered as a great enemy that deserved to be arrested and destroyed. …”
    Get full text
    Article
  18. 2238

    Le concept de « Britishness » dans les emblèmes de Henry Peacham (1612) : vers une reconquête identitaire ? by Julie Corre

    Published 2015-07-01
    “…Finally, Peacham’s emblems aim to reestablish a number of historical landmarks in order to eradicate all possible recalcitrance, particularly from those attacking the Union project.…”
    Get full text
    Article
  19. 2239

    Stink Bugs in Florida Rice by Ron Cherry

    Published 2013-12-01
    “…The stink bug complex attacking Florida rice is the most diversified and unique stink bug complex in US rice production. …”
    Get full text
    Article
  20. 2240

    Security sharing scheme for encrypted data in cloud storage by Wen-bin YAO, Si HAN, Xiao-yong LI

    Published 2015-10-01
    “…With the convenient of storing and sharing data in cloud storage environment,the concerns about data security arised as well.To achieve data security on untrusted servers,user usually stored the encrypted data on the cloud storage environment.How to build a cipertext-based access control scheme became a pot issue.For the access control problems of ciphertext in cloud storage environment,a CP-ABE based data sharing scheme was proposed.Novel key generation and distribution strategies were proposed to reduce the reliance on a trusted third party.Personal information was added in decryption key to resistant conclusion attacks at the same time.Moreover,key revocation scheme was proposed to provide the data backward secrecy.The security and implement analysis proves that proposed scheme is suit for the real application environment.…”
    Get full text
    Article