فیلترها/جستجو در نتایج    

فیلترها

سال

بانک‌ها



گروه تخصصی










متن کامل


اطلاعات دوره: 
  • سال: 

    1388
  • دوره: 

    2
تعامل: 
  • بازدید: 

    538
  • دانلود: 

    183
چکیده: 

فناوری RFID به عنوان یکی از جدیدترین فناوری های موجود در جهان جهت تشخیص هویت و شناسایی افراد و محصولات بکار برده می شود و بسیاری از شرکت ها، سازمان ها و فروشگاه های مختلف از این فناوری برای ردیابی محصولات خود و تشخیص آنها در هنگام خروج محصول استفاده می کنند. ما در این مقاله درباره کاربردهای آن و پروژه هایی که امکان پیاده سازی در ایران را دارد توضیحاتی می دهیم و در آخر طرح پیشنهادی خود را برای کاهش تصادفات جاده ای و کمک به اجرای بهتر قوانین راهنمایی و رانندگی در کشور ایران ارایه می دهیم، همچنین مقایسه ای بین چند روش امنیتی انجام می دهیم.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 538

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 183
اطلاعات دوره: 
  • سال: 

    2014
  • دوره: 

    13
  • شماره: 

    3
  • صفحات: 

    127-130
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    366
  • دانلود: 

    0
چکیده: 

Background: Previous literatures have shown a transient ischemic attack (TIA) mimic rate of 9-31%. We aimed to ascertain the proportion of stroke mimics amongst suspected TIA patients.Methods: A prospective observational study was performed in Ghaem Hospital, Mashhad, Iran during 2012-2013. Consecutive TIA patients were identified in a stroke center.The initial diagnosis of TIA was made by the resident of neurology and final diagnosis of true TIA versus TIA mimics was made after 3 months follow-up by stroke subspecialist.Results: A total of 310 patients were assessed during a 3-month period of which 182 (58.7%) subjects were male and 128 (41.3%) were female. Ten percent of the patients was categorized as a TIA mimic. The presence of hypertension, aphasia, duration of symptoms, and increased age was the strongest predictor of a true TIA. Migraine was the most common etiology of stroke mimic in our study.Conclusion: It seems that many signs and symptoms have low diagnostic usefulness for discrimination of true TIA from non-cerebrovascular events and predictive usefulness of any sign or symptom should be interpreted by a stroke neurologist.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 366

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
اطلاعات دوره: 
  • سال: 

    2017
  • دوره: 

    6
  • شماره: 

    1
  • صفحات: 

    81-98
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    236
  • دانلود: 

    0
چکیده: 

Cooperative Spectrum Sensing (CSS) is an effective approach to overcome the impact of multi-path fading and shadowing issues. The reliability of CSS can be severely degraded under Byzantine attack, which may be caused by either malfunctioning sensing terminals or malicious nodes. Almost, the previous studies have not analyzed and considered the attack in their models. The present study introduces a new issue named attack-aware CSS where the objective is to analyze the occurred attack against CR network to ameliorate the performance of data fusion schemes. The novelty includes the modification of Weighted Sequential Probability Ratio Test (WSPRT) algorithm which resulted in Attack-Aware WSPRT (A2WSPRT). The findings indicated considerable reduction in cooperation overhead and enhancement in correct sensing ratio, especially in severe attacks.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 236

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
اطلاعات دوره: 
  • سال: 

    2018
  • دوره: 

    4
  • شماره: 

    1
  • صفحات: 

    51-52
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    320
  • دانلود: 

    0
چکیده: 

Statins are commonly used drugs in the treatment of hyperlipidemia (HL), despite some undesirable side effects. These range from mild symptoms such as myopathy, muscle weakness and myalgia to severe muscle weakness associated with chronic myopathy and acute renal failure (ARF) as a result of rhabdomyolysis. The most serious and deadly side effect of statins is rhabdomyolysis. The case presented here is of a patient with rhabdomyolysis due to treatment with the antihyperlipidemic drug, atorvastatin.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 320

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
نویسندگان: 

WILLIAMS R.B.

نشریه: 

CIRCULATION

اطلاعات دوره: 
  • سال: 

    2011
  • دوره: 

    123
  • شماره: 

    25
  • صفحات: 

    639-640
تعامل: 
  • استنادات: 

    1
  • بازدید: 

    125
  • دانلود: 

    0
کلیدواژه: 
چکیده: 

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 125

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
اطلاعات دوره: 
  • سال: 

    2021
  • دوره: 

    13
  • شماره: 

    3
  • صفحات: 

    21-30
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    144
  • دانلود: 

    0
چکیده: 

In the present time, web applications are growing constantly in the whole society with the development of communication technology. Since the utilization of WWW (World Wide Web) expanded and increased since it provides many services, such as sharing data, staying connected, and other services. As a consequence, these numerous numbers of web application users are susceptible to cybersecurity breaches to steal sensitive information or crash the users' systems, etc. Particularly, the most common vulnerability today in web applications is the Cross-Site Scripting (XSS) attack. Furthermore, online cyber attacks utilizing cross-site scripting were responsible for 40% of the attack instances that struck enterprises in North America and Europe in 2019. Therefore, cross-site scripting is a form of an injection that targets both vulnerable and non-vulnerable websites, for the injection of malicious scripts. Cross-site scripting XSS operates by directing users to a vulnerable website that contains malicious JavaScript. Then, when malicious code runs in a victim's browser, the attacker has complete control over how they interact with the application. To protect the website or prevent the XSS, must know the application complexity and the way it handles data must be known so it could be controlled by the user. However, Detecting XSS e ectively is still a work in progress, and XSS is considered a gateway for various attacks. However, in this paper, we will introduce the XSS attack and the forms of XSS as a review paper. In addition, the methods and techniques that help to detect cross-site scripting (XSS) attacks.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 144

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
نویسندگان: 

ESFAHANI M. | SOLEIMANY H. | AREF M.R.

نشریه: 

SCIENTIA IRANICA

اطلاعات دوره: 
  • سال: 

    2022
  • دوره: 

    29
  • شماره: 

    4 (Transactions D: Computer Science and Engineering and Electrical Engineering)
  • صفحات: 

    1949-1956
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    54
  • دانلود: 

    0
چکیده: 

CPU caches are powerful sources of information leakage. To develop practical cache-based attacks, the need for automation of the process of finding exploitable cachebased side-channels in computer systems is felt more than ever. Cache template attack is a generic technique that utilizes Flush+Reload attack in order to automatically exploit cache vulnerability of Intel platforms. Cache template attack on the T-table-based AES implementation consists of two phases including the pro , ling phase and key exploitation phase. Pro , ling is a preprocessing phase to monitor dependencies between the secret key and behavior of the cache memory. In addition, the addresses of T-tables can be obtained automatically. At the key exploitation phase, Most Significant Bits (MSBs) of the secret key bytes are retrieved by monitoring the exploitable addresses. This study proposed a simple yet effective searching technique, which accelerates the pro , ling phase by a factor of utmost 64. In order to verify the theoretical model of our technique, the mentioned attack on AES was implemented. The experimental results revealed that the pro , ling phase runtime of the cache template attack was approximately 10 minutes, while the proposed method could speed up the running of this phase up to almost 9 seconds.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 54

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
نویسندگان: 

Seddigh Milad | Soleimany Hadi

اطلاعات دوره: 
  • سال: 

    2020
  • دوره: 

    12
  • شماره: 

    2
  • صفحات: 

    81-89
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    267
  • دانلود: 

    0
چکیده: 

In cloud computing, multiple users can share the same physical machine that can potentially leak secret information, in particular when the memory de-duplication is enabled. Flush+Reload attack is a cache-based attack that makes use of resource sharing. T-table implementation of AES is commonly used in the crypto libraries like OpenSSL. Several Flush+Reload attacks on T-table implementation of AES have been proposed in the literature which requires a notable number of encryptions. In this paper, we present a technique to enhance the Flush+Reload attack on AES in the ciphertext-only scenario by significantly reducing the number of needed encryptions in both native and cross-VM setups. In this paper, we focus on finding the wrong key candidates and keep the right key by considering only the cache miss event. Our attack is faster than previous Flush+Reload attacks. In particular, our method can speed-up the Flush+Reload attack in cross-VM environment significantly. To verify the theoretical model, we implemented the proposed attack.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 267

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
اطلاعات دوره: 
  • سال: 

    1394
  • دوره: 

    6
  • شماره: 

    2
  • صفحات: 

    29-37
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    832
  • دانلود: 

    271
چکیده: 

لطفا برای مشاهده چکیده به متن کامل (PDF) مراجعه فرمایید.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 832

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 271 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
نویسندگان: 

RAZAVI PARASTOO | BERANGI REZA

اطلاعات دوره: 
  • سال: 

    2012
  • دوره: 

    6
  • شماره: 

    4 (23)
  • صفحات: 

    8-12
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    306
  • دانلود: 

    0
چکیده: 

Cognitive radio is a revolutionary technology that made significant progress in the effective use of the frequency spectrum. The technology itself can be dynamically adjusted so that the proper utilization of the available radio spectrum can be made. According to various studies conducted, it is observed that the bulk of each frequency band allocated to users leaving unused. The cognitive radio can use these parts of the spectrum that called spectrum holes.Inherent nature of this technology creates the chance for the attacker in these networks. This vulnerability that created due to the inherent nature of cognitive radio technology, Can severely impact on the safety and quality of service in these networks. In this paper, we focus on the primary user emulation attack. In this attack, an adversary transmits signals whose characteristics emulate those of incumbent signals. We proposed the method for reducing the effects of primary user emulation attacks in cognitive radio networks. This method suggests the technique that can merge with spectrum sensing method and can resistant these networks against the primary user emulation attacks. Finally, with run some simulation, we examined the performance of this proposed method in detection of primary user emulation attacks in these networks.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 306

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button