نتایج جستجو برای: data threats
تعداد نتایج: 2432735 فیلتر نتایج به سال:
With the proliferation of smart devices and revolutions in communications, electrical distribution systems are gradually shifting from passive, manually-operated inflexible ones, to a massively interconnected cyber–physical grid address energy challenges future. However, integration several cutting-edge technologies has introduced many security privacy vulnerabilities due large-scale complexity...
Security remains to be a critical issue in the safe operation of Information Systems (IS). Identifying the threats to IS may lead to an effective method for measuring security as the initial stage for risk management. Despite many attempts to classify threats to IS, new threats to Health Information Systems (HIS) remains a continual concern for system developers. The main aim of this paper is t...
Mapping spatial patterns of potential biodiversity threats is one of the important steps for effective conservation planning and activities. To determine the spatial patterns of threats in Golestan province, 12 criteria in four main groups including structural (fractal coefficient of perimeter, circularity ratio of area, average slope), compositional aspects of biodiversity (presence of species...
Introduction: Medical errors represent a serious public health problem and pose a threat to patient safety. This study aimed to determine the hidden threats in the incidence of medical errors at public hospitals in Tehran. Methods: In this descriptive study, the population included all process owners (12-person teams) in public hospitals of Tehran. The sample size was 396 individuals, sel...
rangelands are known as one of the main income resources for their exploiters.in the recent century, management of iran rangeland has undergone vast transformationsbecause of vulnerable socio-economic conditions of pastoralists. a study was done toprovide a clear picture of the status and utilization of aq qala rangelands via assessinginternal and external environmental factors affecting the ut...
In the last decade, computer science researchers have been working hard to prevent attacks against the security of information systems. Different adversary models have incarnated the malicious entities against which researchers have defined security properties, identified security vulnerabilities, and engineered security defenses. These adversaries were usually intruders, that is, outsiders try...
Organizations continue to be plagued by information leaks caused by insiders with legitimate access to critical or proprietary information. Such unauthorized leaks may result in significant damage to competitiveness, reputation and finances, and organizations should consider proactive approaches to preventing, detecting, and responding to this threat. In this special issue, we have selected eig...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید