学科分类
/ 2
32 个结果
  • 简介:信息产业时代的到来,中国载人飞船的成功发射,数码风暴的“狂风巨浪”,都为我们生活的祥和空间平添一份精彩!

  • 标签: 高中 英语 科技文阅读 阅读训练
  • 简介:DboyAttackTools可以用于扫描网站,测试上传漏洞.Cookies欺骗等等,又是一款典型的集成性软件。除了集成动网经典的上传漏洞利用工具外.它还新增了一个购物商城上传漏洞利用工具.二者都可以直接上传木马.很方便哦。

  • 标签: TOOLS COOKIES 购物商城 漏洞 集成性 工具
  • 简介:用来清理和分离粘接不合适的材料.包括金属、石头、玻璃、木头等类似的材料,将其上已凝固的环氧和聚酯树脂清洗干净.并且不会对其表面产生任何破坏作用。

  • 标签: SOLVENT ATTACK SOLUTION 粘接材料 清理剂 除胶剂
  • 简介:Thispaperpresentsanewmethodforresynchronizationattack,whichisthecombinationofthedifferentialcryptanalysisandalgebraicattack.Byusingthenewmethodonegetsasystemoflinearequationsorlow-degreeequationsaboutinitialkeys,andthesolutionofthesystemofequationsresultsintherecoveryoftheinitialkeys.Thismethodhasalowercomputationalcomplexityandbetterperformanceofattackincontrasttotheknownmethods.Accordingly,thedesignoftheresynchronizationstreamgeneratorsshouldbereconsideredtomakethemstrongenoughtoavoidourattacks.WhenimplementedtotheToyocrypt,ourmethodgainsthecomputationalcomplexityofO(217),andthatofO(267)forLILI-128.

  • 标签: 流量密码 代数攻击 微分密码分析 计算复杂性
  • 简介:AnapproachofdefendingagainstDistributedDenialofService(DDoS)attackbasedonflowmodelandflowdetectionispresented.TheproposedapproachcanprotecttargetsfromDDoSattacking,andallowtargetstoprovidegoodservicetolegitimatetrafficunderDDoSattacking,withfastreaction.Thisapproachadoptsthetechniqueofdynamiccombfilter,yieldsalowleveloffalsepositivesoflessthan1.5%,dropssimilarpercentageofgoodtraffic,about1%,andpassesneglectablepercentageofattackbandwidthtothevictim,lessthan1.5%.Theprototypeofcommercialproduct,D-fighter,isdevelopedbyimplementingthisproposedapproachonIntelnetworkprocessorplatformIXP1200.

  • 标签: 分布式反向服务 DDOS 流程模型 流程检测
  • 简介:KARACHI:ThearmycommanderinthePakistanicityofKarachinarrowly^①escapedassassination^②yesterdaywhengunmenattackedhisconvoy^③withgunfireandabomb,killingatleast10andwoundinghisdriver,officialssaid.

  • 标签: 海外报刊 高中 英语 注释 阅读练习
  • 简介:AlinearizationattackontheKeyStreamGenerator(KSG)ofthemodifiedE0algorithmproposedbyHermelin[ProceedingsofICISC'99,SpringerLNCS1787,2000,17-29]isgiveninthispaper.TheinitialvaluecanberecoveredbyalinearizationattackwithO(260.52)operationsbysolvingaSystemofLinearEquations(SLE)withatmost220.538unknowns.FrederikArmknecht[CryptologyePrintArchive,2002/191]proposedalinearizationattackontheKSGofE0algorithmwith0(270.341)operationsbysolvinganSLEwithatmost224.056unknowns,sothemodificationproposedbyHermelinreducestheabilityofE0toresistthelinearizationattackbycomparingwiththeresultsofFrederikAnnknecht.

  • 标签: 编密码系统 线性化攻击 Eo算法 线性方程
  • 简介:Westudytheattackvulnerabilityofnetworkwithduplication-divergencemechanism.Numericalresultshaveshownthattheduplication-divergencenetworkwithlargerretentionprobabilityσismorerobustagainsttargetattackrelatively.Furthermore,duplication-divergencenetworkisbrokendownmorequicklythanitscounterpartBAnetworkundertargetattack.SuchresultisconsistentwiththefactofWWWandInternetnetworksundertargetattack.Soduplication-divergencemodelisamorerealisticoneforustoinvestigatethecharacteristicsoftheworldwidewebinfuture.Wealsoobservethattheexponentγofdegreedistributionandaveragedegreeareimportantparametersofnetworks,reflectingtheperformanceofnetworksundertargetattack.Ourresultsarehelpfultotheresearchonthesecurityofnetwork.

  • 标签: 复杂网络系统 网络攻击 统计动力学 双重分岐机制
  • 简介:AbstractHuman-elephant conflict (HEC) in India is becoming a growing health problem causing many fatalities every year. Elephants produce injuries by trampling, stomping, squeezing, tossing in the air, or crushing/targeting the head and chest commonly. The adult elephants are most aggressive in their mating season, leading to maximum incidences of HECs in this period. These attacks are mostly unprovoked, though most HECs are provoked. In this case series, the authors described the injuries sustained by three survivors in a short span of one month due to the sudden and unprovoked elephant attack. All the injuries were mild to moderate in severity and involved the chest in common. Timely rescue and prompt initiation of treatment were pivotal in their survival. The authors also want to create awareness about the mating season of elephants to minimize these unfortunate events in the future.

  • 标签: Elephants Elephant attack Human-elephant conflict Musth
  • 简介:「ButterflyCaught」是MassiveAttack乐队新专辑「100thWindow」的第二首单曲,在这部MV中,我们看到一只飞蛾栖息在歌手的身边,鼓动着羽翼,渐渐的,飞蛾和歌手的脸融为一体,歌手的脸慢慢转变成飞蛾的纹理……

  • 标签:
  • 简介:最新的一项研究表明那些乘坐交通工具上下班的人们,无论是自驾车,骑自行车还是坐公交车,他们在乘坐交通工具一个小时后患心脏病的几率提高了两倍。科学家们对此做出了不同的解释。

  • 标签: 参考答案 大学英语 阅读训练 注释读物
  • 简介:Experimentalstudywasconductedforboundary-layersonasharp5°half-angleconeof400mmlengthatanglesofattack.ThemodelwastestedintheT-326hypersonicwindtunnel(ITAM)atfreestreamMachnumberM=5.95.Meanandfluctuationwallcharacteristicsoftheboundarylayeraremeasuredat0°2°3°and4°anglesofattackfordifferentstagnationpressures.PulsationmeasurementsarecarriedoutbymeansofALTPsensor.Pressureandtemperaturedistributionsalongthemodelareobtained,andtransitionbeginningandendlocationshavebeenfound.Boundarylayerstabilizationwiththeincreaseofangleofattackandthedecreaseofstagnationpressureisobserved.Highfrequencypulsationsinherenttohypersonicboundarylayer(secondmode)havebeendetected.

  • 标签: 可压缩边界层 角锥 实验 高超声速风洞 温度分布模型 特征测量
  • 简介:AbstractLeopard attacks on humans are reported most often from the Indian subcontinent. The bite wounds are complex injuries infected with polymicrobial inoculum and may present as punctures, abrasions, lacerations or avulsions. The presentation and acceptable treatment of these injuries vary according to the wound. We hereby describe the clinical presentation and treatment of a male victim with leopard bite injuries on the head and neck region. As bite injuries are commonly found on and around the face, maxillofacial surgeons should be familiar with the therapy. Through thorough clinical and radiological examination, it is essential to prevent missing any hidden injuries, which can easily turn lethal. To benefit the rural population, more health facilities need to be established in remote areas.

  • 标签: Maxillofacial injuries Bite Leopard Larynx Mandible Pharynx
  • 简介:我们与一个悦耳的攻击信息参数为建筑群的坚韧性介绍一个新奇模型。知道的随机的失败和故意的攻击是我们的模型的二种极端情况。基于模型,我们分别地在随机的信息和优先的信息下面学习复杂网络的坚韧性。用产生函数方法,我们为网络的崩溃和巨大的部件的尺寸导出节点的批评移动部分的准确的值。我们证明随机隐藏就节点的小部分能阻止一个没有规模的网络折叠并且检测就节点preferentiallycan破坏的小部分一个没有规模的网络。

  • 标签: 坚固模型 复合物 网络 信息参数
  • 简介:Anovelbroadcastencryptionschemeforgroupcommunicationscenariosindistributednetworksispresented.Inthescheme,anyoneisallowedtoencryptamessageanddistributeittoadesignatedgroup.Eachmemberinthedesignatedgrouphastheabilitytoindependentlydecryptaciphertext.Incontrasttotraditionalbroadcastencryption,allthevalidreceiversintheproposedschemecomposethedesignatedgroup.Totakeadvantageofthisproperty,atabforthegroupissetandthematchingprivatekeyforeachmemberisgenerated.Inaddition,beforedecryptingaciphertext,anyoneintheschemecanverifytheciphertext,toensurethattheciphertextiscorrect.Thispropertyisveryimportantforlarge-scalegroupcommunication,asthegatewaycanfilterincorrectciphertextandalleviatethereceiver'sworkload.Finally,aproofintherandomoraclemodelisgiven,toshowthattheproposedschemeissecureagainsttheadaptivelychosenciphertextattack.

  • 标签: 广播 选择性密码攻击 编码方法 通信安全
  • 简介:Inthispaper,anexperimentalstudyonthesulphateattackresistanceofhigh-performanceconcrete(HPC)withtwodifferentwater-to-binderratios(w/b)undercompressiveloadingispresented.Thesulphateconcentration,compressivestrength,andthemasschangeintheHPCspecimensweredeterminedforimmersioninaNa2SO4solutionoverdifferentdurationsunderexternalcompressiveloadingbyself-regulatingloadingequipment.Theeffectsofthecompressivestress,thew/bratio,andtheNa2SO4solutionconcentrationontheHPCsulphateattackresistanceundercompressiveloadingwereanalysed.TheresultsshowedthattheHPCsulphateattackresistanceundercompressiveloadingwascloselyrelatedtothestresslevel,thew/bratio,andtheNa2SO4solutionconcentration.Applyinga0.3stressratioforthecompressiveloadingorreducingthew/bratioclearlyimprovedtheHPCsulphateattackresistance,whereasapplyinga0.6stressratioforthecompressiveloadingorexposingtheHPCtoamoreconcentratedNa2SO4solutionacceleratedthesulphateattackandHPCdeterioration.

  • 标签:
  • 简介:现在,云计算的开发把力量给了抑制资源的网络控制系统(NCS)采购重计算到云服务器。然而,云计算的发展关于在云和控制系统之间的电子物理的连接生产了许多安全挑战。在控制系统和云服务者之间的连接能受到分布式的拒绝服务(DDoS)由一个攻击者的攻击使动摇NCS。在这份报纸,我们将由为如此的系统造安全机制处理这个问题。我们将为NCS的更好稳定的性能设计一条察觉途径和一条缓解途径。为了在DDoS的时候保证NCS的稳定性,攻击,当有从云可得到的不再实时的答案时,我们将也为云控制系统(CCS)设计切换的机制(SM)。最后,我们将把建议机制用于无人的arial车辆(UAV)。我们的模拟结果证明机制在DDoS攻击下面在NCS的稳定性和保护工作很好。

  • 标签:
  • 简介:RemotesensingtechnologyhasbeenwidelyrecognizedforcontributingtoemergencyresponseeffortsaftertheWorldTradeCenterattackonSeptember11th,2001.Theneedtocoordinateactivitiesinthemidstofadense,yetrelativelysmallarea,madethecombinationofimageryandmappeddatastrategicallyuseful.Thispaperreviewstheroleplayedbyaerialphotography,satelliteimagery,andLIDARdataatGroundZero.Itexamineshowemergencymanagersutilizedthesedatasets,andidentifiessignificantproblemsthatwereencountered.Itgoesontoexploreadditionalwaysinwhichimagerycouldhavebeenused,whilepresentingrecommendationsformoreeffectiveuseinfuturedisastersandHomelandSecurityapplications.Toplanadequatelyforfutureevents,itwasimportanttocaptureknowledgefromindividualswhorespondedtotheWorldTradeCenterattack.Inrecognition,interviewswithkeyemergencymanagementandgeographicinformationsystem(GIS)personnelprovidethebasisofthispaper.Successfultechniquesshouldnotbeforgotten,orseriousproblemsdismissed.AlthoughwidelyusedafterSeptember11th,itisimportanttorecognizethatwithbetterplanning,remotesensingandGIScouldhaveplayedanevengreaterrole.Togetherwithadataacquisitiontimeline,anexpandeddiscussionoftheseissuesisavailableintheMCEER/NSFreport'EmergencyResponseintheWakeoftheWorldTradeCenterAttack:TheRemoteSensingPerspective'(HuyckandAdams,2002).

  • 标签: 遥感技术 世界贸易中心 WTC 应急管理 地面零点 合成孔径雷达