نتایج جستجو برای: defense strategy
تعداد نتایج: 415439 فیلتر نتایج به سال:
Trophic mechanisms that can generate biodiversity in food webs include bottom-up (growth rate regulating) and top-down (biomass regulating) factors. The top-down control has traditionally been analyzed using the concepts of "Keystone Predation" (KP) and "Killing-the-Winner" (KtW), predominately occuring in discussions of macro- and micro-biological ecology, respectively. Here we combine the cla...
The effectiveness of multiple UAVs at attacking the enemy target and defending against simultaneously gained researchers’ attention due to their cost efficiency high mission success rates. This paper explores UAV swarm vs. offense/defense confrontation decision-making while aircraft carriers on open seas. system is developed as a multi-agent system. Precisely, every modeled an independent agent...
Ethics in a multinational company environment is related to business problems, but the position of corporate partnership determines sustainable companies. The study aims integrate concept social investment (SI) with state defense mining companies' environment. Social Investment ethics as part Corporate Citizenship (CC) has different base. CSR for companies an honest effort towards surrounding c...
BACKGROUND: The passive defense approach is one of the approaches in planning and organizing cities and residential complexes with the aim to reduce environmental hazards. Given the vital and sensitive position of cities, while preparing against military invasions, this approach provides special capabilities to cope with natural and human crises to a large extent. METHODS: This was an applied s...
In Brazil, it is observed that the researchers in field of Administration keep a certain distance to studies National Defense. this direction, scope study there an incapability between strategic actions provided for Defense Strategy (NDS) and capabilities Industry Base (DIB). It assumed companies linked DIB must know their dynamic capabilities, so they can, planning, develop allow them cooperat...
In 2004, the Trojan horse defense was at a crossroads, having been successfully employed in two child pornography cases in the United Kingdom, resulting in acquittals. Despite the early successes, the Trojan horse defense has failed to become a regularly employed strategy. The original Trojan horse defense has now become part of the more general technical SODDI (Some Other Dude Did It) defense,...
The Eurosystem should modify its definition of price stability to a symmetric and unam-biguous inflation target, at the level of 1.5 or 2% per year. It should abandon its two-pillar strategy and adopt the superior international-best-practice strategy of flexible inflation targeting. The big question is whether the Eurosystem will be able to abandon its stubborn defense of an inferior monetary-p...
In this paper, for a battlefield self-organizing network the security flaw of RTS/CTS handshake mechanism will be analyzed based on its hierarchical and clustering features. By utilizing the fact that Cluster-type structure is easily to lead to the false blocking problem, a Denial of Service attack method is proposed. In this method, the attacker utilizes the pair nodes to forge malicious infor...
This work studies the impact of the pollution attack in a fully connected live video streaming P2P push based overlay network, as well as the effectiveness of using trusted peers as the only defense mechanism. Determining the best strategies for both: i) trusted peers (TPs) with the aim to detect and expel malicious peers (MPs) and ii) malicious peers in order to pollute without being detected,...
Exploitation of the global Information and Communications Technology (ICT) supply chain is a growing security concern for government and industry. This paper frames the key elements of global ICT supply chain security and its importance to government as well as private sector companies, and the development of a comprehensive strategy for education, training, and awareness of the U.S. Department...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید