attacks相关论文
目的 探讨分析小剂量丙戊酸镁联合抗精神药物治疗精神分裂症患者攻击行为的临床效果。方法 随机选取2017年6月至2019年5月间本院收......
Due to the increasing cyber-attacks,various Intrusion Detection Systems(IDSs)have been proposed to identify network anom......
In recent years,wireless communication applications have become a major part in our life.Almost every day we check our e......
The framework Information Technology professionals and Network Organizations use is often seen as open and dynamic. This......
该文从挂篮荷载计算、施工流程、支座及临时固结施工、挂篮安装及试验、合拢段施工、模板制作安装、钢筋安装、混凝土的浇筑及养生......
Cyber attacks pose severe threats on synchronization of multi-agent systems.Deception attack,as a typical type of cyber ......
In recent years, Internet exposure of applications continuously engenders new forms threats that can endanger the securi......
In recent years, Internet exposure of applications continuously engenders new forms threats that can endanger the securi......
Information Theoretic Distinguishers for Timing Attacks with Partial Profiles: Solving the Empty Bin
In any side-channel attack, it is desirable to exploit all the available leakage data to compute the distinguisher’s va......
随着全球科学技术的迅猛发展和信息技术的广泛应用,信息网络系统的安全性问题已经成为全社会关注的焦点,并且已成为涉及国家政治、......
ARP协议对于网络安全有着举足轻重的影响。分析了ARP协议的漏洞;根据这些漏洞列举了目前出现的各种ARP攻击形式;总结提出了基于主要......
Application Independent Dynamic Group-Based Key Establishment for Large-scale Wireless Sensor Networ
Key establishment and its management in Wireless Sensor Networks(WSN) is a challenging problem due to its limited resour......
通过对第9届全国运动会女足第二阶段决赛中进攻情况的统计与分析,及与第8届全国运动会女足比赛相关数据的对比,结果表明:九运会女......
目前无线传感器网络路由协议的研究多以网络生存时间为目标,缺乏对路由安全的考虑。分析了无线传感器网络路由协议容易受到的攻击......
传感器网络集成了传感器、计算机和网络三大技术,是一种全新的信息获取和处理技术。目前,针对不同的应用以及网络结构,提出了很多......
数字技术的飞速发展使得多媒体的交流达到了前所未有的深度和广度。数字媒体的诸多优点带来便利的同时也使作品侵权更加容易。数字......
数字水印是一种较新的数字产品版权保护技术,本文系统研究了数字水印技术常用攻击和反攻击方法,并对未来的发展进行了展望。......
目的应用靶向长链非编码RNA母系表达基因3(LncRNA MEG3)的过表达重组质粒来转染体外培养的人脑胶质瘤细胞,从而观察其对人脑胶质瘤......
网络攻击往往发生在应用层,这些攻击主要针对web服务器、浏览器和所访问到的信息.目前,人们虽未找到防范七层模型受到攻击的措施,......
Web服务具有平台无关性、动态性、开放性和松散耦合等特征,这给基于异构平台的应用集成带来极大便利,使越来越多的企业使用Web服务。......
远程缓冲区溢出漏洞是网络安全领域危害最严重的安全漏洞,提高远程缓冲区溢出攻击防御能力成为安全研究的重要课题。本文提出了一种......
目的:分析Notch1在黑素瘤发展过程中的作用和机制。方法:采用RT-PCR检测Notch1mRNA在黑素瘤和正常黑素细胞中的表达,采用慢病毒转......
Ethernet-based Passive Optical Network(EPON) is considered a very promising solution for the first mile problem of the n......
With the increasing deployment of wireless sensordevices and networks,security becomes a criticalchallenge for sensor ne......
SDN (Software Defined Network) has many security problems, and DDoS attack is undoubtedly the most serious harm to SDN a......
Co-residency of virtual machines(VMs)of different tenants on the same physical platform would possibly lead to cross-VM ......
黑客入侵是网络安全的极大隐患,防范黑客入侵是保障网络安全的重要工作。介绍黑客入侵的几种方法以及相应的防范措施。......
为掌握篮球竞赛中哪些挫折因素容易引发攻击行为,以CUBA男子运动员为研究对象进行调查研究,结果表明:容易引起攻击行为的挫折情境因素......
目的:对住院精神病患者攻击行为进行分析,提出相应的护理对策。方法:对本院2005年12月-2007年12月1 163例住院精神病患者,根据病史收......
目的探讨塞来昔布对人直肠癌LoVo细胞增殖、侵袭等生物学行为的影响。方法通过CCK-8法检测细胞的增殖情况,利用流式细胞术检测细胞......
随着互联网技术的高速发展,基于B/S模式的Web应用程序得到了广泛的应用,当这些Web应用程序没有对接收到的数据进行合法性审查过滤时,系......
目的探讨过表达叉头框蛋白N3(FOXN3)对食管癌细胞增殖、凋亡、迁移和侵袭的影响。方法通过RT-qPCR实验检测正常食管上皮细胞HEEC、......
网络环境的开放和动态特性使得多代理系统的安全问题越发严峻,一种可行的最小化威胁的方案是通过实时评估交互代理的信任,以信任作......
结合当前P2P僵尸网络研究状况,归纳、总结出P2P僵尸网络的定义、属性及其特点,针对P2P僵尸网络的工作原理提出相应的安全机制,使之......
As cyber attacks increase in volume and complexity,it becomes more and more difficult for existing analytical tools to d......
本文分析局域网内频繁发生的ARP欺骗攻击原理,通过软件采构造ARP欺骗数据包,编写出进行模拟ARP攻击实验。......
As a new type of Denial of Service(DoS)attacks,the Low-rate Denial of Service(LDoS)attacks make the traditional method o......
工业纵向和横向一体化水平的不断提高,增加了自动化控制系统中的安全风险几率.通过对人、设备和环境造成危害故障的概率分析,利用安全......
目的观察小儿哮咳喘胶囊治疗小儿哮喘发作期的临床疗效。方法选200例哮喘发作期患儿,随机分为治疗及对照组,每组100例。治疗组给予......
数字水印是一种全新的信息安全技术。本文论述了数字水印技术的应用和安全性、稳健性的关系。对四类不同原理的攻击:简单攻击、同......
...
Side-channel attacks based on supervised learning require that the attacker have complete control over the cryptographic......
目前功耗分析已经作为一种新型密钥攻击方法广泛的应用于破解嵌入式加密芯片密钥中,其破解技术也随着防御措施的加固越来越发迭。功......
Purpose The goal of this study was to examine the association of calcium supplements with coronary artery disease and su......
Internet of Things (IoT) has become a prevalent topic in the world of technology. It helps billion of devices to connect......
The behavior and nature of attacks and threats to computer network systems have been evolving rapidly with the advances ......
Firstly, the nonnegative matrix factorization with sparseness constraints on parts of the basis matrix (NMFSCPBM) method......
Effectiveness of Built-in Security Protection of Microsoft’s Windows Server 2003 against TCP SYN Bas
Recent DDoS attacks against several web sites operated by SONY Playstation caused wide spread outage for several days, a......