نتایج جستجو برای: security communication
تعداد نتایج: 505280 فیلتر نتایج به سال:
packaging is one of the most important parts of the food industry that is related to food security and it acts as a preserver that maintains the health of its content. product's packaging is the only mean of communication that absorb the attention of consumers in the store among other choices. the packaging is referred to as the silent salesman which means that it sells the product on retail sh...
one of the most important challenges for researchers is deciding on how to collect their data. there are various views on using telephone interviews. conducting telephone interviews on women of 40 years old and older in isfahan about mammography screening behavior showed that it could be an appropriate method for data collection when there is a combination of effective communication process and...
ing Non-Interference
Home and Building Automation (HBA) systems are traditionally concerned with the control of heating, ventilation, air conditioning, as well as lighting and shading systems. Services from the safety and security domain are typically provided by separated, application specific subsystems. An integration with the core HBA systems is done (if at all) at the management level. Nowadays, the rising des...
Current IP communication style is not optimized and has various problems. Sufficient security considerations (including privacy protection) are not provided. Despite the “well-known port” method being known to be inappropriate from security standpoint, it continues to be used it. The conventional belief that one node owns one IP address and communication sessions are basically multiplexed at th...
The Middle East due to communication pathway, energy sources, imperialist experiences, its cultural conflicts and geopolitic conditions, has found a realistic environment based on problems of public, national and regional security.In a way that these conditions have not led to any peace and stability in the Middle East region. Therefore, study of process of formation of security issues in the ...
The Internet of things (IoT) has become a significant element of next generation. IoT is a proposed development of the internet in which the objects have network connectivity able to transmit and receive data. The IoT applications such as smart homes, smart cities and health care. WSN is an important technology of IoT. Typically sensor nodes are considered resource constrained device with limit...
This work aims to investigate how the Security-by-Contract (SxC) paradigm, developed for providing security assurances to mobile applications, can be used for guaranteeing the security of communicating systems composed by several, heterogeneous components. These components need to communicate with each other by establishing direct, point to point connections. Direct connections can involve comp...
Past research on information technology (IT) security training and awareness has focused on informing employees about security policies and formal sanctions for violating those policies. However, research suggests that deterrent sanctions may not be the most powerful influencer of employee violations. Often, employees use rationalizations, termed neutralization techniques, to overcome the effec...
The power grid is currently undergoing changes towards highly volatile and localized energy production and storage, supported by IT and communication components. Smart Metering is going to provide fine-grained measurement and automatic remote reading of consumption and production amounts. It enables flexible tariffing and dynamic load optimization, ultimately aiming at cost and consumption redu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید