نتایج جستجو برای: deterrence and securing social defense

تعداد نتایج: 16953888  

2009
Feng Qian Zhiyun Qian Zhuoqing Morley Mao Atul Prakash

A major challenge in securing end-user systems is the risk of popular applications being hijacked at run-time. Traditional measures do not prevent such threats because the code itself is unmodified and local anomaly detectors are difficult to tune for correct thresholds due to insufficient training data. Given that the target of attackers are often popular applications for communication and soc...

Journal: :مدیریت شهری 0
mehdi modiri ali rezaei moghadam mohammad reza mirzaee zahra hosseini sadat mahaleh

due to its neighborhood with afghanestan and the subsequent problems of this country such as insecurity, weak economic conditions, and lack of proper border monitoring, khorasan razavi province has always been the inhabitat of numerous foreign nationals. legal and illegal entry of these people has created plenty of issues from different economic, social, and cultural aspects for the citizens of...

1997
STEVEN SHAVELL

The legal system is an expensive social institution, raising the question of whether the amount of litigation is socially appropriate. The thesis developed here is that it is not—because of fundamental differences between private and social incentives to use the legal system. These differences permeate litigation, affecting decisions about the bringing of suits, settlement versus trial, and tri...

Journal: :The Journal of Supercomputing 2021

Wireless sensor networks (WSNs), as an integral part of most Internet Things (IoT) devices, are currently proliferating providing a new paradigm emerging technologies. It is estimated that the number globally connected products will increase exponentially in next decade. Therefore, it not surprising finding applications different areas such smart homes, cities, industry, e-health, defense, secu...

2015
Bennet S. Yee J. D. Tygar Alfred Z. Spector

We introduce a new method of approaching security in distributed systems: self-securing programs. These programs run securely on distributed operating systems which provide only minimal security facilities. We have built a system called Strongbox to support self-securing programs on Mach, a distributed operating system, and Camelot, a distributed transaction facility. Strongbox uses negligible ...

کاظمی, مسعود ,

Crimes related to narcotic and psychotropic are one of the most significant concerns of the world (because of mass production of aformentioned drugs), specially in our country. therefore, various international conventions in this regard has been adopted around the world. furthermore, in this context, countries in their domestic law, have enacted lots of regulations. meanwhile, the death penalty...

Journal: :Social Science Research Network 2021

Very little is known about the efficient collection of fines despite their indispensable contribution to local government budgets. This paper fills an important gap in literature by studying effectiveness deterrence (enforcement) and non-deterrence (social norms) letters that aim improve traffic parking fines. We discuss potential mechanisms through which these may affect fine compliance presen...

2008
Ellen Ramvi

A study among school teachers showed that a “social defence system” (Menzies Lyth, 1959) develops in the school in response to a threat to the teacher’s identity. The need for defence stems from emotions experienced by the professional, which are difficult to articulate, cope with and finds solutions to. Together with an external pressure on efficiency a system develops that is resistant to cha...

2013
Ayman Mohamed Mostafa Mohamed Hashem Abdel-Aziz Ibrahim Mahmoud El-Henawy

The security of database depends on a set of systems, roles, procedures, and processes that protect the entire database from unintended activities. Unintended activities can be categorized as authenticated misuse, malicious attacks or inadvertent mistakes made by authorized users. If any intruder succeeds in attacking the system network, the database security will be the last line of defense in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید