نتایج جستجو برای: infrastructural index
تعداد نتایج: 398825 فیلتر نتایج به سال:
Abstract—The threat modeling process starts with the phases of identifying critical assets, creating an architecture overview, and decomposing to identify possible points of attack. Data flow diagrams and sequence diagrams are used in this process. This paper proposes an alternative flow-based methodology for building an architectural map for the system. It provides a high-level methodology for...
This article examines the role of espionage in defending against cyber-attacks on infrastructural firms. We analyze the problem using a game between a government, an infrastructural firm and an attacker. If the attacker successfully breaches the IT security defenses of the infrastructural firm, primary losses accrue to that firm while widespread collateral losses accrue to the rest of the econo...
d: m.a. of business management. university of isfahan . [email protected] e: isfahan university of medical sciences , [email protected] knowledge as one of the greatest factors in creating value and competitive advantage, has led organizations to show great tendency toward programs of knowledge management. understanding the relationship between infrastructural capabilities and process c...
This paper shows how different properties of time and their ethical implications are reflected in the framing debates around planning perceived problem delay delivery infrastructure. We examine way which plans can take form ‘time maps’ that linear projections a series events. lead to assumptions desired futures only be achieved if actions constitute events performed correctly often coupled with...
Industry continues to look for methods of gaining competitive advantage through manufacturing techniques. These techniques, however, can be matched by competitors if used without the guidance of a strategic framework. Similarly, structural capacity choices can be matched by competitors without the infrastructural benefits of a well defined operations strategy. In this study, multiattribute util...
Research in context-aware systems shows that using context information enables the development of personalized mobile applications. The context acquisition process in a context-aware (CA) system consists of two main roles: context producing entities (e.g. wrapped sensors) and context consuming entities (e.g. CA application). A CA system can be seen as a hierarchy of associated context producers...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید