نتایج جستجو برای: data threats

تعداد نتایج: 2432735  

Journal: :اقتصاد و توسعه کشاورزی 0
حمیدرضا میرزایی مرتضی رجوعی امیرحسین اخروی

abstract the objectives of this study were to identify the strengths (s), weaknesses (w), opportunities (o) and threats (t) in producing milk in the province of sistan and baluchestan . furthermore, the study attempted at developing strategies towards effective management of in the milk production. under the current situation, the study data was collected using questionnaires responded by three...

Journal: :ECTI Transactions on Computer and Information Technology 2022

Aside from smart technologies, farm data collection is also important for farms including environment and farmer survey collection. With collection, we observe that it generally proposed to utilize in systems. However, can be released use the outside scope of collecting organization an appropriate business reason such as improving system, product quality, customer service. Moreover, often inclu...

Journal: :RFC 2004
Michelle Engelhardt Danley Deirdre K. Mulligan John B. Morris Jon Peterson

This document provides some analysis of threats against the Geopriv protocol architecture. It focuses on protocol threats, threats that result from the storage of data by entities in the architecture, and threats posed by the abuse of information yielded by Geopriv. Some security properties that meet these threats are enumerated as a reference for Geopriv requirements. Danley, et al. Informatio...

Journal: :International journal of scientific research in computer science, engineering and information technology 2023

This literature review paper aims to examine and analyze the existing research on prediction models for different types of cyber-attacks. Four key papers have been selected as base this review: "A Prediction Model DoS Attack's Distribution Discrete Probability," "Apriori Viterbi Prior Detection Socio-Technical Attacks," "Cyber Attacks Based Bayesian Network," "Applying Data Science Cybersecurit...

Journal: :Applied sciences 2023

As time continues to advance, the need for robust security threat mitigation has become increasingly vital in software. It is a constant struggle maximize test coverage through optimal data generation. We conducted explanatory research of requirements as modeled structured misuse case description (SMCD). The acceptance designed threats. Mal activity from SMCD upon which constraints are specifie...

Journal: :International Journal of Environmental Research and Public Health 2021

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید