نتایج جستجو برای: threats

تعداد نتایج: 31573  

Journal: :General and comparative endocrinology 2009
Luke K Butler Isabelle-Anne Bisson Timothy J Hayden Martin Wikelski L Michael Romero

Dependent young are often easy targets for predators, so for many parent vertebrates, responding to offspring-directed threats is a fundamental part of reproduction. We tested the parental adrenocortical response of the endangered black-capped vireo (Vireo atricapilla) and the common white-eyed vireo (V. griseus) to acute and chronic threats to their offspring. Like many open-nesting birds, our...

2008
J. G. Alfaro M. Barbeau E. Kranakis

Detecting and responding to security and privacy threats to Electronic Product Code (EPC) and Radio Frequency IDentification (RFID) technologies are becoming major concerns of information security researchers. However, and before going further in these activities, an evaluation of the threats in terms of importance must be done. We present such an evaluation. Our analysis of the threats is base...

2011
Michael A. Cant

In human societies, social behaviour is strongly influenced by threats of punishment, even though the threats themselves rarely need to be exercised. Recent experimental evidence suggests that similar hidden threats can promote cooperation and limit within-group selfishness in some animal systems. In other animals, however, threats appear to be ineffective. Here I review theoretical and empiric...

2011
Summer Olmstead Ambareen Siraj

The critical infrastructure powering the nation is currently undergoing a massive collaborative effort to integrate modern technologies with 50 year-old assets derived from 100 year-old designs. Improving the existing electric power infrastructure with smart grid technologies compounds existing threats with new threats. Identification of next generation smart grid security threats is vital for ...

Journal: :CoRR 2001
Shireesh Reddy Annam

As more business activities are being automated and an increasing number of computers are being used to store vital and sensitive information the need for secure computer systems becomes more apparent. These systems can be achieved only through systematic design; they cannot be achieved through haphazard seat-of-the-pants methods. This paper introduces some known threats to the computer securit...

Journal: :Conservation biology : the journal of the Society for Conservation Biology 2009
Matt W Hayward

Thorough evaluation has made the International Union for Conservation of Nature (IUCN) Red List the most widely used and accepted authority on the conservation status of biodiversity. Although the system used to determine risk of extinction is rigorously and objectively applied, the list of threatening processes affecting a species is far more subjectively determined and has not had adequate re...

Journal: :Laws 2021

Throughout the Trump administration, media coverage of extremist factions American right grew considerably, as did actual membership and numbers those factions. Included among these factions, operating on a spectrum that ranges from center-to-fringe right, are white supremacist, Christian nationalist, militia/patriot/sovereign citizen (broadly termed constitutionalist) movements. While is heter...

2014
Amadeu Anderlin Neto Tayana Conte

During the planning phase of an experiment, we must identify threats to validity in order to assess their impact over the analyzed data. Furthermore, actions to address these threats must be defined, if possible, so that we can minimize their impact over the experiment’s results. In this paper, we propose the Threats to Validity Assistant (TVA), which is a tool to assist novice researchers in i...

Journal: :RFC 2005
Erik Nordmark Tony Li

This document lists security threats related to IPv6 multihoming. Multihoming can introduce new opportunities to redirect packets to different, unintended IP addresses. The intent is to look at how IPv6 multihoming solutions might make the Internet less secure; we examine threats that are inherent to all IPv6 multihoming solutions rather than study any specific proposed solution. The threats in...

2006
Brian Floyd

Security threats abound in today’s digital age and along with this, network administrators need to adhere to industry best practices when it comes to their internet infrastructure. Security threats arise almost on a daily basis and an aware administrator needs to be able to understand the types of risks and be able to respond quickly and appropriately. This paper discusses the basics of differe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید