Buscar
Mostrando ítems 1-10 de 1160
Location proximity attacks against mobile targets: Analytical bounds and attacker strategies
Location privacy has mostly focused on scenarios where users remain static. However, investigating scenarios where the victims present a particular mobility pattern is more realistic. In this paper, we consider abstract ...
Methods based on interdependent networks to analize the robustness of the internet
(Universidad de Chile, 2022)
The Internet allows us to communicate, access online education, commerce, etc. Its relevance has become even more apparent in recent times as we have seen the need to rely more on online communication and services. In order ...
Speculative attacks, openness and crises
(Escola de Pós-Graduação em Economia da FGV, 2007-09-01)
In this paper we propose a dynamic stochastic general equilibrium model to evaluate financial adjustments that some emerging market economies went through to overcome external crises during the latest decades, such as ...
Diseño de un escenario de red virtual para la exploración y control de ataques basados en dns
(2019)
Most of the attacks based on DNS Domain Name System TCP IP protocol go unnoticed by most users, because the attacker conceals his identity so as to make others believe that it is only a failure in the network, unless there ...
Cyber-attacks in modular multilevel converters
(IEEE-Inst Electrical Electronics Engineers, 2022)
Distributed control of modular multilevel converter (MMC) submodules (SMs) offers several potential benefits such as flexibility, scalability, and modularity. In this approach, low-level control tasks, such as capacitor ...
An unusual case of predation: dog-pack or cougar attack?
(Wiley Blackwell Publishing, Inc, 2013-02)
Injuries produced by animals are capable of leaving severe patterns and in some cases may result in the death of the attacked individual. Law enforcement authorities may come to erroneous conclusions about the source of ...