نتایج جستجو برای: چالشهای امنیتی security challenges
تعداد نتایج: 462934 فیلتر نتایج به سال:
Abstract. As modern vehicles are sophisticated IoT devices with intelligence, capable of connecting to external infrastructure and utilizing vehicle-to-everything (V2X) communications, communications need be secured so that cyberattacks do not reach their destination. In addition, the various organs car (sensors, controls) can have weaknesses lead accidents or potential fatalities. Automakers a...
با فروپاشی اتحاد جماهیر شوروی در 1991 ، کشورهای حوزهی خزر استقلال یافتند. ا ن ی شورها از نظر ژئوپل ت یی، اقتصادی، امنیتی و فرهنگی موقعیت ویژه ای پیدا کردند. نظام ک ک ی بینالملل با تولد کشورهای متعدد در حوزهی خزر روبهرو شد و کشورهای پیرامون این منطقه و دولتهای بزرگ در مواجه با مسائل جدید قرار گرفتند. در ضمن حضور قدرتهای بزرگ ب رون منطقه به خصوص آمریکا و همپیمانانش )اسرائیل، ترکیه و آذربایجان و.....
عملیات انتحاری که در طی آن فرد از وجود خود به عنوان ابزاری برای کشتن دیگران استفاده می کند از سال 2003 به بعد به شکل گسترده ای باعث ناامنی و قتل هزاران انسان در عراق شده است. ...
Khazarprovide Iran with an excellent geopolitical position, while Iran's "antdomination policy" not only deprive it from these privileges but alsobring some serious security challenges for it. U.S. engagement in vasteconomic, military and political undertakings in this region is one of majorthreat for Iran's vital interests. I'm going to argue here that majordifficulty in the way of consisting ...
Dependability and security are two system concerns that cannot be considered independently. Solving a dependability problem might introduce new challenges for security and vice versa. In this paper we contribute to this discussion with a corresponding example in the domain of online auctioning where we will show how an improvement to system dependability can introduce new security challenges.
With ever advancing in digital system, security has been emerged as a major concern. Many researchers all around the world come up with solutions to address various challenges that are crucial for industry and market. The aim of this survey is a brief review of challenges of security validation as well as define and classify Hardware Trojans. Then, we provide more details about various validati...
As our world becomes more computerized and interconnected, computer security and privacy will continue to increase in importance. In this paper, I overview several computer security and privacy challenges faced by end users of the technologies we build, and how we can design and build technologies that better match user expectations with respect to security and privacy. I close with open challe...
This article presents the key insights about the environment and security links in the context of the Persian Gulf region. This research paper focuses on the challenge of finding a balance among development, armed conflicts and environmental degradation in the Persian Gulf region. Environmental security challenges are human security, sustainable development and regional cooperation in the Persi...
Fast growing population, excessive expansion of cities, and dominance of automobile in urban life have troubled cities with complicated traffic problems. In many parts of the world, transport network development has always been considered as a solution for this problem. Apparently, one-dimensional ‘traffic solutions’ would never thoroughly bring best results as the city and its problems are com...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید