نتایج جستجو برای: adversary legal system

تعداد نتایج: 2314073  

2015
Jonathan M. Spring Edward Stoner

The goal of computer network defense (CND) is to protect the system and ensure the organization operates resiliently under strain [1]. To succeed, the CND strategy must plan for adversary response to defensive measures. Part of this planning is strategic management of equities. In the security field, the word equities has a special meaning: information assets that provide an advantage over the ...

Journal: :مجله مطالعات حقوق تطبیقی 0
نسرین طباطبائی حصاری دکتری حقوق خصوصی از دانشگاه تهران

the system of land registration is protective formalism that is formed based on the theory of “public confidence”. this theory presumes that what reflected by the land registration offices is based on the legal fact. this theory, which provides legal stability and security in transactions, is manifested in three guiding principles including “mirror principle”, “curtain principle” and “insurance...

Journal: :Information Technology and Management 2009
Praveen Paruchuri Jonathan P. Pearce Janusz Marecki Milind Tambe Fernando Ordóñez Sarit Kraus

We consider the problem of providing decision support to a patrolling or security service in an adversarial domain. The idea is to create patrols that can achieve a high level of coverage or reward while taking into account the presence of an adversary. We assume that the adversary can learn or observe the patrolling strategy and use this to its advantage. We follow two different approaches dep...

2003
Bruce D. Burns Regina Vollmeyer

Competition has been studied as something to be averted, yet rarely has it been asked what processes may be involved in successful competition. We tested whether more accurate modeling of an adversary can assist competitive success. Pairs played a zero-sum game with no specific skill component over 40 trials. We measured the relative accuracy of the players’ second-order model (i.e., what I thi...

2016
Ashe Magalhaes

Cyber enterprise systems often are difficult to protect due to a large number of sub-components that must work in concert to remain resilient. In cyber enterprises where incoming traffic may approach a few megabits per second, an IDS and host system controlled by a Markov Decision Process may serve as an efficient resiliency solution. However, the structure of this model leverages very little i...

زارعی, محمدحسین, مولائی, آیت,

  Administrative contracts are legal institutions that have been discussed in field of public law in the legal Roman – German system, France in particular, and it is said that in the country it has increasingly been developed and now it is an eloquence situation. But the institution have not been developed in Common law system (England in particular) and there is a kind of impossibility in acce...

2011
Malcolm M. Feeley Setsuo Miyazawa Tom Ginsburg Sho Sato

2013
Amnon Ta-Shma

The task of privacy amplification, in which Alice holds some partially secret information with respect to an adversary Eve and wishes to distill it until it is completely secret, is known to be solvable almost optimally in both the classical and quantum worlds. Unfortunately, when considering an adversary who is limited only by nonsignalling constraints such a statement cannot be made in genera...

Journal: :IEEE Transactions on Information Forensics and Security 2019

Journal: :Distributed Computing 2010

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید