نتایج جستجو برای: spying operation
تعداد نتایج: 211944 فیلتر نتایج به سال:
Eric Lander spoke to Nature during his first day as the director of White House Office Science and Technology Policy.
We analyze industrial espionage in the context of entry deterrence. We consider a monopoly incumbent, who may expand capacity to deter entry, and a potential entrant who owns an inaccurate Intelligence System. The Intelligence System generates a noisy signal on incumbent's actions and the potential entrant decides whether to enter based on this signal. If the precision of the Intelligence Syste...
Interpersonal curiosity (IPC) is the desire for new information about people. Fifty-one IPC items were administered to 321 participants (248 women, 73 men), along with other measures of curiosity and personality. Three factors were identified from which five-item subscales were developed that had good internal consistency: Curiosity about Emotions, Spying and Prying, and Snooping. Confirmatory ...
This article provides a quantitative analysis of privacy compromising mechanisms on one million popular websites. Findings indicate that nearly nine in ten websites leak user data to parties of which the user is likely unaware of; over six in ten websites spawn third-party cookies; and over eight in ten websites load Javascript code from external parties onto users’ computers. Sites which leak ...
abstract regarding temporal variation of rivers discharge and demands, for suitable use of dam reservoirs stored water, application of operation rule curves is necessary. operation rules are expressed with rule curves. application of yield model is one of the methods of operation curve preparation, which correlates reservoir operation with reservoir storage volume in first period. in this study...
Nowadays botnets are playing an important role in the panorama of cybercrime. These cyber weapons are used to perform malicious activities such financial frauds, cyber-espionage, etc... using infected computers. This threat can be mitigated by detecting C&C channels on the network. In literature many solutions have been proposed. However, botnet are becoming more and more complex, and currently...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید