نتایج جستجو برای: security analysis
تعداد نتایج: 2963315 فیلتر نتایج به سال:
Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...
this study examined the status and determinants of rural households’ food security in moyale district of pastoral area, oromia regional state, in ethiopia. both secondary and primary data were used for the study. the study was based on the survey of a total of 100 farmers randomly selected using a three-stage sampling technique. analytical tools used include descriptive statistics, foster-greer...
This paper studies the role of social security in the prevention of social deviances. About 304 of high school girl students in Shoush (South west of Iran) were (systematic) randomly chosen. The research method was survey with questionnaire. The data were analyzed through spss along with Pearson coefficient correlation, Analysis of Variance, multivariable regression and path analysis were used ...
the purpose of this research is to examine the effect of the islamic awakening in the arabic countries of the middle east and north africa on israeli ontological security and, it's strategy ofclosure and deviationin the regional level. in other words, after occurrence of the developments, the ontological security and identity of israel faced with what challenges? this research argues that ...
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
after collapse of the soviet :union:, south caucasus countries (azerbaijan, armenia, georgia) gained independence. this independence was associated with tensions such as ethnic and territorial disputes. these conflicts contain kharabakh, abkhazia, and south ossetia which have remained unresolved till now. the main question is why these conflicts have remained unresolved and what conditions are ...
This research is intended to consider the Psychometric characteristics of Feeling Security Scale (TFSS) in Tehran. 3103 Tehrani citizens filled in this form. The Scale validity was checked for its content Validity (referees contingency coefficient) and construct validity (Factor analysis). The results of referee’s contingency coefficient showed that all the obtained coefficients were above 92% ...
to evaluate and predict component-based software security, a two-dimensional model of software security is proposed by stochastic petri net in this paper. in this approach, the software security is modeled by graphical presentation ability of petri nets, and the quantitative prediction is provided by the evaluation capability of stochastic petri net and the computing power of markov chain. each...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید