نتایج جستجو برای: unauthorized exploiters

تعداد نتایج: 4344  

Journal: :Int. J. Digital Earth 2011
Mazlan Hashim Norzailawati Mohd. Noor Maged Marghany

The paper explores a framework combining remote sensing and GIS-cellular automata (CA) concepts aimed at improving the modeling of unauthorized land use sprawl. Remote sensing data have been used in urban modeling and analysis, the use of high-resolution remote sensing data in assessing unauthorized development is quite unexplored. This work has demonstrated systematic combination utilization o...

2011
Stephen Lee

More than two-thirds of the unauthorized immigrant population—roughly 8 million out of 11.2 million—is in our nation’s workforce, and growing evidence suggests that unauthorized workers are more likely than their authorized counterparts to experience workplace-related violations. Although scholars have begun shifting their focus to the agencies empowered to regulate immigrants in the workplace,...

Journal: :Journal of Business Venturing Insights 2021

We investigate COVID-19 as a disabling and an enabling mechanism for small mid-size enterprises (SMEs), particularly how SMEs’ crisis strategies might help them through the crisis. SMEs can follow retrenchment strategy, persevering or innovation they do so narrowly broadly. Using representative sample of Danish SMEs, we test are associated with turnover expectations. find distinct differences i...

2006
Parag Agarwal B. Prabhakaran Bhavani Thuraisingham

Distributed web services are under constant threat of being attacked from nodes, internal or external to the system. Internal attacks may result from hijacking of trusted web servers, resulting in loss/corruption of information, and Denial of Service (DoS) to clients. External attacks can occur from hijacking of trusted clients or malicious nodes leading to DoS to clients. The paper focuses on ...

Journal: :Security and Communication Networks 2014
Di Ma Nitesh Saxena

RFID systems are becoming increasingly ubiquitous in both public and private domains. However, due to the inherent weaknesses of underlying wireless radio communications, RFID systems are plagued with a wide variety of security and privacy threats. A large number of these threats arise due to the tag’s promiscuous response to any reader requests. This renders sensitive tag information easily su...

Journal: :International Journal of Sustainable Built Environment 2017

Journal: :IEEE Transactions on Emerging Topics in Computing 2013

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید