نتایج جستجو برای: security threats

تعداد نتایج: 201039  

Journal: :Sir Syed Research Journal of Engineering & Technology 2013

Journal: :سیاست 0
مهدی عباس زاده فتح آبادی استادیار گروه علوم سیاسی دانشکدة حقوق و الهیات دانشگاه شهید باهنر کرمان روح الله سبزی دانشجوی کارشناسی ارشد علوم سیاسی دانشکدة حقوق و الهیات دانشگاه شهید باهنر کرمان

this paper argues for a broader emphasis on sustainable security and smart power, for examining both opportunities as well as threats to security. sustainable security is a new concept in the security studies. deep attention to all possible threats against human life is necessary for continuation of security in a sustainable and dynamic base. this aim can be achieved in a highest level by mergi...

There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...

ژورنال: یافته 2017
شکری جوکاری, سمیرا, فلاحی, ابراهیم, قاضی, شیرین,

Background: This paper aims to examine the association between food security and passive defense and the position of food security in this context. Given the role of healthy manpower in the development of a country and the importance of healthy food and nutrition in human health as the core center of development and the main confronting factor with foreign threats, in this paper, we first discu...

2013
Praveen Kumar Mishra

Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA) and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentia...

2011
Frederic Lemieux

This report focuses on how federal agencies define success in computer crime investigations and how they can facilitate the development and refinement of a comprehensive law enforcement strategy for addressing cyber threats. Through interviews with experienced computer crime investigators from the Federal Bureau of Investigation, the U.S. Secret Service, and the Air Force Office of Special Inve...

حاتمی, محمد رضا,

Developments in Syria have been one of the most important events that have influenced the foreign policy and consequently, national security of Islamic Republic of Iran in a way that Syria’s condition has become a game with numbers for Iran and any fundamental development in its political structure significantly influence Iran’s security. For years, Syria has had the role of a gate for Iran to ...

2013
Sumana Basu Sukanya Ghosh

Though RFID provides automatic object identification, yet it is vulnerable to various security threats that put consumer and organization privacy at stake. In this work, we have considered some existing security protocols of RFID system and analyzed the possible security threats at each level. We have modified those parts of protocol that have security loopholes and thus finally proposed a modi...

Journal: :IJCAT 2008
Dianxiang Xu Vivek Goel Kendall E. Nygard W. Eric Wong

This paper presents an aspect-oriented approach to integrated specification of functional and security requirements based on use-case-driven software development. It relies on explicit identification of security threats and threat mitigations. We first identify security threats with respect to use-case-based functional requirements in terms of security goals and the STRIDE category. Then, we su...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید