نتایج جستجو برای: physical security

تعداد نتایج: 830792  

Journal: :IEEE open journal of the Communications Society 2021

The sixth generation (6G) of mobile network will be composed by different nodes, from macro-devices (satellite) to nano-devices (sensors inside the human body), providing a full connectivity fabric all around us. These heterogeneous nodes constitute an ultra dense managing tons information, often very sensitive. To trust services provided such network, security is mandatory feature design. In t...

Journal: :IEEE Internet of Things Journal 2017

Journal: :IEEE Communications Magazine 2013

حسنی, سید عباس, حسینی, سید محمد, سعیدی, حسین, ظاهری, محمد مهدی, عباسی, محسن, فتحی, مرضیه,

  Background & Aim: The stressful environment of the emergency department exposes the staff to the hazards posed by physical and verbal violence.This can affect not only the job security and satisfaction among the personnel but also the service and care offered to the patients. This study has been designed to determine the incidence rate of physical and verbal violence inflicted by patients and...

Journal: :iau international journal of social sciences 2015
zahra farzizadeh somayeh haghi roghayeh aghaziyarati

social happiness is one of the humanity’s most necessary innate needs and which plays a crucial role in the sublimity of individuals and society. reaching this would occur once individual has either physical or mental health. one of the effective factors in increasing the amount of individuals’ social happiness especially in women is providing them with mental dimension of security e.g. felling...

2012
Seon-gyoung Sohn

Both physical and IT security are necessary to guarantee the safety of industrial facilities; however, the two elements are operated separately in most organizations. To solve the security problems caused by this segregated operation of security systems, studies on the integration of physical and IT security are being conducted actively. To that end, event integration technology, which collects...

2016
Rajesh K. Sharma

This chapter provides a survey of physical layer security and key generation methods. This includes mainly an overview of ongoing research in physical layer security in the present and next generation communication networks. Although higher layer security mechanisms and protocols address wireless security challenges in large extent, more security vulnerabilities arise due to the increasingly pe...

Introduction: Today, the use of picture archiving and communication system (PACS) in health care centers is increasing. Meanwhile, the security of data of patients with COVID-19 in this system and control of access to such data is considerably significant. Therefore, this study aimed to evaluate the security of medical picture archiving and communication systems for recording data of COVID-19 p...

Journal: :J. Cybersecurity 2015
Arunesh Sinha Thanh Hong Nguyen Debarun Kar Matthew Brown Milind Tambe Albert Xin Jiang

Security is a critical concern around the world. In many domains from cyber-security to sustainability, limited security resources prevent complete security coverage at all times. Instead, these limited resources must be scheduled (or allocated or deployed), while simultaneously taking into account the importance of different targets, the responses of the adversaries to the security posture, an...

2015
Tianbo Lu Jinyang Zhao Lingling Zhao Yang Li Xiaoyan Zhang

Today, cyber physical systems (CPS) are becoming popular in power networks, healthcare devices, transportation networks, industrial process and infrastructures. As cyber physical systems are used more and more extensively and thoroughly, security of cyber physical systems has become the utmost important concern in system design, implementation and research. Many kinds of attacks arise (e.g. the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید