نتایج جستجو برای: sabotage
تعداد نتایج: 598 فیلتر نتایج به سال:
Alzheimer’s disease (AD) is an irreversible that leads to neurodegeneration. The underpinning mechanisms of neuronal cell death are a matter ongoing debate regarding the impact accumulation amyloid beta (Aβ) peptide and post-translation modifications tau protein. However, growing area research one may provide more rigorous account early changes seen in brains inflammation. Brain inflammation co...
With the integration of IT with business operations and management, organizations are vulnerable to a myriad of threats ranging from computer viruses to natural disasters and deliberate acts of sabotage. Consequently, IT disaster recovery has emerged as a critical organizational issue. This paper proposes an application portfolio-based framework for IT disaster recovery planning based on the ro...
George Bunn, who served on the U.S. delegation that negotiated the Treaty on the Non-Proliferation of Nuclear Weapons (NPT), is a Consulting Professor at the StanfordUniversity Center for International Security and Cooperation (CISAC). Fritz Steinhausler is a Professor of Physics and Biophysics at the University of Salzburg in Austria and a Visiting Professor at CISAC. Lyudmila Zaitseva is a Vi...
Reducing the risk of oil spills and mitigating the prospect of terrorist attacks and sabotage is essential for protecting the environment and reducing economic losses. Oil spill surveillance constitutes a critical component of an effective security program and oil spill disaster management. Advances in remote sensing technologies can help to identify potential threats and minor spills before th...
Immune systems face a daunting control challenge. On the one hand, they need to minimize damage from pathogens, without wasting energy and resources, but on the other must avoid initiating or perpetuating autoimmune responses. Finally, because pathogens interfere with immune function, immune systems must be robust against sabotage. We describe here how these challenges are met by two immune sys...
A regulated upstream monopolist supplies an essential input to firms in a downstream market. Non-price discrimination or sabotage becomes a concern when the upstream monopolist vertically integrates downstream. This article develops a simulation algorithm to determine the likelihood that discrimination will arise in equilibrium using data from the US long-distance market. Based on 1000 random d...
A model of dynamic networks is introduced which incorporates three kinds of network changes: deletion of nodes (by faults or sabotage), restoration of nodes (by actions of “repair”), and creation of nodes (by actions that extend the network). The antagonism between the operations of deletion and restoration resp. creation is modelled by a game between the two agents “Destructor” and “Constructo...
Grid computing networks aggregate huge computing power that they need for solving different scientific problems. This power can be used for attacking the grid’s components as well as outside computers. Attacks such as the Denial of Service (DoS) could be used to target user machines, servers, and security management solutions to sabotage the normal operations of the grid computing network. In t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید