Buscar
Mostrando ítems 11-20 de 15191
Coati (Nasua nasua) Attacks on Humans: Case Report
(Elsevier B.V., 2010-12-01)
Coatis [including Nasua nasua, the ring-tailed coati], are medium-sized mammals widely distributed in the Americas. They are social animals, whose normal diet includes insects, fruits, and small vertebrates, and rarely ...
Coati (Nasua nasua) Attacks on Humans: Case Report
(Elsevier B.V., 2010-12-01)
Coatis [including Nasua nasua, the ring-tailed coati], are medium-sized mammals widely distributed in the Americas. They are social animals, whose normal diet includes insects, fruits, and small vertebrates, and rarely ...
Joint attacks and accrual in argumentation frameworks
(College Publications, 2021-07)
While modelling arguments, it is often useful to represent joint attacks, i.e., cases where multiple arguments jointly attack another (note that this is different from the case where multiple arguments attack another in ...
Adaptive neural security control for networked singular systems under deception attacks
(2022)
This paper studies the issue of the adaptive neural security controller design for uncertain networked singular systems in the presence of deception attacks. Considering that the attack signal is unknown, the neural networks ...
Protecting Web Services against DoS Attacks: A Case-Based Reasoning Approach
(06/23/2010)
The real-time detection is a key factor to detect and block DoS attacks within Web services. DoS attacks can be generated for different techniques that take advantage of points vulnerable within Web services. This paper ...
Two approaches to the problems of self-attacking arguments and general odd-length cycles of attack
(Elsevier Science, 2009-12)
The problems that arise from the presence of self-attacking arguments and odd-length cycles of attack within argumentation frameworks are widely recognized in the literature on defeasible argumentation. This paper introduces ...
Solving Stackelberg Security Games For Multiple Defenders and Multiple Attackers
(2015)
In the last years, there has been a substantial effort in the application of Stackelberg game-theoretic approaches in the security arena, in which security agencies implement patrols
and checkpoints to protect targets ...
An approach to mitigate denial of service attacks in ieee 802.11 networks
(2014)
Wireless networks are widely deployed and have many uses, for example in critical embedded systems. The applications of this kind of network meets the common needs of most embedded systems and addressing the particularities ...
A Security Proposal Based on a Real Time Agent to Protect Web Services Against DoS Attack
(2012-07-02)
This paper describes a novel proposal based on a real time agent to detect and block denial of service attacks within web services environments. The real time agent incorporates a classification mechanism based on a Case-Base ...