نتایج جستجو برای: breach flow

تعداد نتایج: 486434  

Introduction: Women injured by their husband's breach of contract need help and therapy to overcome their emotional and emotional problems. This research was conducted with the aim of determining the effectiveness of emotion-oriented therapy based on attachment trauma and spirituality-oriented schema therapy on the anxiety and emotional capital of women affected by a spouse's breach of contract...

Journal: :CoRR 2016
Aamo Iorliam Santosh Tirunagari Anthony Tung Shuen Ho Shujun Li Adrian Waller Norman Poh

Statistical characteristics of network traffic have attracted a significant amount of research for automated network intrusion detection, some of which looked at applications of natural statistical laws such as Zipf’s law, Benford’s law and the Pareto distribution. In this paper, we present the application of Benford’s law to a new network flow metric “flow size difference”, which have not been...

2013
Griselda Sinanaj Jan Muntermann

Corporate reputation represents a core asset of companies and research has shown that better reputation can have positive effects such as increased revenues and sales. On the other hand, companies may suffer reputational damage that can result from internal or external and potentially unforeseen events such as operational losses. In this paper, we present an empirical analysis of how unforeseen...

Journal: :Studies in health technology and informatics 2010
Geraldine Mackenzie Hugh Carter

This chapter gives an educational overview of: * An awareness of the legal issues involved in health informatics * The need for the privacy and security of the patient record * The legal consequences of a breach of the security of the patient record * The concept of privacy law and what precautions ought to be taken to minimize legal liability for a breach of privacy and/or confidentiality.

2017
Kamil Safin Rita Kuznetsova

The paper investigates method for the style breach detection task. We developed a method based on mapping sentences into high dimensional vector space. Each sentence vector depends on the previous and next sentence vectors. As main architecture for this mapping we use the pre-trained encoder-decoder model. Then we use these vectors for constructing an author style function and detecting outlier...

2015
Armin Sarabi Parinaz Naghizadeh Ardabili Yang Liu Mingyan Liu

This paper aims to understand if, and to what extent, business details about an organization can help provide guidelines for better resource allocation across different preventive measures, in order to effectively protect, detect, and recover from, different forms of security incidents. Existing work on analyzing the distribution of risk across different incident categories, most notably Verizo...

Journal: :Frontiers in Marine Science 2022

Nature-based strategies, such as wave attenuation by tidal marshes, are increasingly proposed a complement to mitigate the risks of failure engineered flood defense structures levees. However, recent analysis historic coastal storms revealed smaller dike breach dimensions if there were natural, high marshes in front dikes. Since naturally only experience weak flow velocities (~0-0.3 ms -1 durin...

Journal: :Geomorphology 2022

The sudden breach of a landslide dam seriously threatens the safety people and property downstream. failure mechanism dams is significantly affected by grain size distribution material. In this study, series experiments are conducted to investigate effects composition on stability, process, parameters dams. results show that remain stable with seepage for coarse-dominated dam, fail overtopping ...

2017

User passwords were first introduced to allow time sharing on large mainframes. Mainframes at the time were large systems within a controlled environment. Passwords were stored in plain text file with no perceived need to secure user passwords. The first documented password breach occurred when a user wanted to gain additional time on a mainframe than the allotted four hours limit. The user sim...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید