نتایج جستجو برای: defense behavior
تعداد نتایج: 690602 فیلتر نتایج به سال:
خریداران عموماً در مورد کالاها براساس ویژگیهای بیرونی (extrinsic cues) آنها قضاوت می کنند ، به ویژه هنگامیکه سنجش ویژگیهای ذاتی کالا مشکل باشد. به همین علت است که کشـور سـازنده کـالـا، (country of origin or coo) ، یکی از این ویژگیهای بیرونی محصول ، عموماً برای ارزیابی کالاهای خارجی مورد استفاده قرار میگیرد. اثرات کشور سازنده کالا در حوزه رفتار خرید مصرف کننده (consumer buying behavior)بطور گسترده...
Because of the dynamic and open characteristics of the cloud computing, continuing malicious attacks happen frequently. Combining the idea of trusted cloud, a trust-based defensive system model for cloud computing has been constructed to guarantee the cloud security. Through real-timely monitoring, users’ behavior evidences have been obtained and standardized; a new method for users’ trust eval...
This study explored how religious fundamentalism related to irrational beliefs and primitive defense mechanisms. We also explored how the personality factors of openness to experience and neuroticism moderated these relations. Participants (N = 120) were recruited in an urban area from a Northeastern university, a psychotherapy center, and through Internet advertising. The results demonstrated ...
abstract the aim of the present study was to compare defense mechanisms of patients with major depression, anxiety disorders, and normal individuals. a total of 224 individuals (87 depressed, 64 anxious, 73 normal) participated in this study, voluntarily. following a psychiatric diagnosis of the psychological disorders, all participants were asked to complete the defense style questionnaire (ds...
The modern state has monopolized the legitimate use of force. This concept is twofold. First, the state is empowered with enforcement rights; second, the rights of the individuals are (partly) restricted. In a simple model of property rights with appropriation and defense activity, we show that a restriction of private enforcement is beneficial for the property owner, even if there are no econo...
Artificial intelligence methods have often been applied to perform specific functions or tasks in the cyber– defense realm. However, as adversary methods become more complex and difficult to divine, piecemeal efforts to understand cyber–attacks, and malware–based attacks in particular, are not providing sufficient means for malware analysts to understand the past, present and future characteris...
Abstract Recently, deep neural networks have been shown to be vulnerable backdoor attacks. A is inserted into via this attack paradigm, thus compromising the integrity of network. As soon as an attacker presents a trigger during testing phase, in model activated, allowing network make specific wrong predictions. It extremely important defend against attacks since they are very stealthy and dang...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید