نتایج جستجو برای: adversary legal system
تعداد نتایج: 2314073 فیلتر نتایج به سال:
The goal of computer network defense (CND) is to protect the system and ensure the organization operates resiliently under strain [1]. To succeed, the CND strategy must plan for adversary response to defensive measures. Part of this planning is strategic management of equities. In the security field, the word equities has a special meaning: information assets that provide an advantage over the ...
the system of land registration is protective formalism that is formed based on the theory of “public confidence”. this theory presumes that what reflected by the land registration offices is based on the legal fact. this theory, which provides legal stability and security in transactions, is manifested in three guiding principles including “mirror principle”, “curtain principle” and “insurance...
We consider the problem of providing decision support to a patrolling or security service in an adversarial domain. The idea is to create patrols that can achieve a high level of coverage or reward while taking into account the presence of an adversary. We assume that the adversary can learn or observe the patrolling strategy and use this to its advantage. We follow two different approaches dep...
Competition has been studied as something to be averted, yet rarely has it been asked what processes may be involved in successful competition. We tested whether more accurate modeling of an adversary can assist competitive success. Pairs played a zero-sum game with no specific skill component over 40 trials. We measured the relative accuracy of the players’ second-order model (i.e., what I thi...
Cyber enterprise systems often are difficult to protect due to a large number of sub-components that must work in concert to remain resilient. In cyber enterprises where incoming traffic may approach a few megabits per second, an IDS and host system controlled by a Markov Decision Process may serve as an efficient resiliency solution. However, the structure of this model leverages very little i...
Administrative contracts are legal institutions that have been discussed in field of public law in the legal Roman – German system, France in particular, and it is said that in the country it has increasingly been developed and now it is an eloquence situation. But the institution have not been developed in Common law system (England in particular) and there is a kind of impossibility in acce...
The task of privacy amplification, in which Alice holds some partially secret information with respect to an adversary Eve and wishes to distill it until it is completely secret, is known to be solvable almost optimally in both the classical and quantum worlds. Unfortunately, when considering an adversary who is limited only by nonsignalling constraints such a statement cannot be made in genera...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید