Measuring network time

Author(s):  
Philip Pond
PLoS ONE ◽  
2019 ◽  
Vol 14 (7) ◽  
pp. e0220295 ◽  
Author(s):  
Yicheol Han ◽  
Stephan J. Goetz

Proceedings ◽  
2021 ◽  
Vol 74 (1) ◽  
pp. 1
Author(s):  
Hilal Çepik ◽  
Ömer Aydın ◽  
Gökhan Dalkılıç

With virtual assistants, both changes and serious conveniences are provided in human life. For this reason, the use of virtual assistants is increasing. The virtual assistant software has started to be produced as separate devices as well as working on phones, tablets, and computer systems. Google Home is one of these devices. Google Home can work integrated with smart home systems and various Internet of Things devices. The security of these systems is an important issue. As a result of attackers taking over these systems, very serious problems may occur. It is very important to take the necessary actions to detect these problems and to take the necessary measures to prevent possible attacks. The purpose of this study is to test whether an attack that attackers can make to these systems via network time protocol will be successful or not. Accordingly, it has been tried to attack the wireless connection established between Google Home and an Internet of Things device over the network time protocol. Attack results have been shared.


2021 ◽  
Vol 104 ◽  
pp. 102214
Author(s):  
Ting He ◽  
Yong Zheng ◽  
Zherui Ma

2009 ◽  
pp. 135-164
Author(s):  
Emanuela Rabaglietti ◽  
Silvia Ciairano

- The study is aimed at constructing a typology of patterns of peer relationships in Italy and the Netherlands and at investigating the longitudinal relationships with beliefs and expectations about relationships and school, psychological discomfort and antisocial and risky behaviour. 439 adolescents of both gender, aged from 15 to 20 years participated at the study. We described four patterns of 158 peer relationships: Isolated (dimension of network, time spent with friends and support perceived by friends were all low), Deep (only perceived support was high; more frequent among girls in both countries), Superficial (only quantitative aspects were high; more frequent among boys), Integrated (both quantitative and qualitative aspects). We found both stability (higher among Superficial and Integrated) and change (higher among Isolated and Deep). The Isolated showed the lowest beliefs and expectations and involvement in risk behaviours, the Deep and the Superficial showed intermediate levels of both beliefs and risk behaviour, and the Integrated showed the highest levels. We also found a great similarity in the links among relational models, beliefs, psychological discomfort and risk behavior in Italian and Dutch adolescents. However, when adopting the same relational model, the Italians perceived higher sense of alienation and depressive feelings and were more involved in lying and disobedience than the Dutch.


Complexity ◽  
2017 ◽  
Vol 2017 ◽  
pp. 1-11
Author(s):  
Haifei Liu ◽  
Tingqiang Chen ◽  
Zuhan Hu

This empirical research applies cointegration in the traditional measurement method first to build directed weighted networks in the context of stock market. Then, this method is used to design the indicators and the value simulation for measuring network fluctuation and studying the dynamic evolution mechanism of stock market transaction networks as affected by price fluctuations. Finally, the topological structure and robustness of the network are evaluated. The results show that network structure stability is strong in the bull market stage and weak in the bear market stage. And the convergence rate of the dynamic evolution of network fluctuation is higher in the bull market stage than in the bear market stage.


Sign in / Sign up

Export Citation Format

Share Document