نتایج جستجو برای: spying operation
تعداد نتایج: 211944 فیلتر نتایج به سال:
A distributed protocol is presented for anonymous and secure voting that is failure-tolerant with respect to malicious behavior of individual participants and that does not rely on a trusted third party. The proposed voting protocol was designed to be executed on a fixed group of N known participants, each of them casting one vote that may be a vote for abstention. Several attack vectors on the...
With the dramatic shift of internet use away from desktop and laptop PCs toward smartphones and tablets, protection thresholds for application, device and communication security have significantly lowered. Most attempts on reversing this situation by means of converting standard mobile devices into tamper-proof equipment have proven to leave ample space for vulnerability of mobile processes and...
corporations have a key role in economic development, growth of national security and financial competition. the key of power is in economy. so in the global village, the economic competition replaces military conflict. a new concept in criminal justice is corporate crime. these crimes as a kind of white collar crime are studied in light of critical criminology findings of this study shows that...
Botnets are an enabler for many cyber-criminal activities and often responsible for DDoS attacks, banking fraud, cyber-espionage and extortion. Botnets are controlled by a botmaster that uses various advanced techniques to create, maintain and hide their complex and distributed C&C infrastructures. First, they use P2P techniques and domain fast-flux to increase the resilience against take-down ...
This article provides a quantitative analysis of privacy compromising mechanisms on one million popular websites. Findings indicate that nearly nine in ten websites leak user data to parties of which the user is likely unaware of; over six in ten websites spawn third-party cookies; and over eight in ten websites load Javascript code from external parties onto users’ computers. Sites which leak ...
Taking the example of two 1960s popular spy films this paper explores how social semiotics can make a contribution to the analysis of film music. Following other scholars who have sought to create inventories of sound meanings to help us break down the way that music communicates, this paper explores how we can draw on the principles of Hallidayan functional grammar to present an inventory of m...
Studies on underground (or clandestine forms of political struggle) remain largely unknown with just a few them published. The study focuses work in southern Mozambique from the 1950s to 1970s. main argument that seeks make is despite intensification colonial exploitation for benefit Portuguese capital, violent repression, imprison and systematic denial exercise rights most Mozambican people, p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید