نتایج جستجو برای: threats
تعداد نتایج: 31573 فیلتر نتایج به سال:
This paper introduces a threat model for ad hoc networks. It indicates components that can be used to form an adversary model for sensor networks and mobile ad hoc networks (MANETS). It identifies threat categories, modes of use, and a variety of threats to the systems assets including: threats to communications, threats to infrastructure services, threats to individual nodes, and threats conce...
our country, iran, is in the category of waterless and survived countries because of lack of climate downfalls to its unsuitable local to temporal transmittance. environmental concerns mainly after 1960s that have boon seriously proposed in universal politics, created a variety of assessments. in the late decades, environmental change such as: climate change, has caused chief challenges for the...
security building processes after world war ii, were under the influence of realistic thoughts. this was considered a reaction to idealistic and institutional approaches. critical school attempted to criticize classical and structural realism. new security theoreticians emphasize on extended subjects and diverse threats and believe it to be beyond the competition of countries. they believe that...
There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...
BACKGROUND Following the April 20, 1999, massacre at Columbine High School, Littleton, Colo, school administrators, law enforcement officials, and the media reported a rash of successive bomb threats and threats of school violence that were attributed to imitation. OBJECTIVE To establish that the clustering of threats of school violence following the Columbine massacre was initiated by imitat...
The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats...
affecting the economy of independent pharmaciesone can never deny the influence of chain pharmacies as a powerful competitor over the economy of independent pharmacies. in one view, integrating independent pharmacies with low turnover into chain pharmacies can save them; on the other hand, chain pharmacies can lead to more treat for independent pharmacies life.patient costsit is expected to dec...
0
Security remains to be a critical issue in the safe operation of Information Systems (IS). Identifying the threats to IS may lead to an effective method for measuring security as the initial stage for risk management. Despite many attempts to classify threats to IS, new threats to Health Information Systems (HIS) remains a continual concern for system developers. The main aim of this paper is t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید