نتایج جستجو برای: cyber spaces
تعداد نتایج: 145945 فیلتر نتایج به سال:
Cyber threat modeling is an analytical process that used for identifying the potential threats against a system and supporting selection of security requirements in early stages development life cycle. Thus, vital instrument realization secure-by-design principle. Despite being well-known practice software projects, its adaptation to cyber-physical systems still requires systematic elaboration....
along with the advent of recent communicative technologies, new cyber social networks have been emerged as the most influential line of interaction. this is a new world free from many of constraints and limitations of the physical world. it lacks weather, gravity, and geographical features; therefore it does not require addressing many of structures and necessities of the real world. in the vir...
Purpose: Cyber social networks and cyberspace are like a double-edged sword that brings favorable and unfavorable consequences. The advantages cannot prevent us from neglecting its dangerous disadvantages that disregard the ethical principles and community values. The present research has been carried out to explain the factors related to the implementation of cyber social network policies in I...
The threat of high impact low probability (HILP) events on power distribution system is substantial but quite unpredictable. Enhancing the resilience grids against such requires solving combinatorial planning and operational problems in stochastic spaces, as well classifying conditions based high-dimensional input data. Since traditional mathematical solutions struggle with both uncertainty cur...
Background: Given the appropriateness of cyberspace and its interconnectedness, each country is expected to minimize the possibility of harmful actions by securing and continuously monitoring the Internet and the virtual world. Of course, part of this goal will be achieved through the adoption of appropriate national laws and, in part, through proper education of citizens and the development of...
Today fast urban growth and personal vehicles in benefit of riders, causes serious drop of the quality of the urban environment and pedestrian spaces. Urban walking areas have vital role in citizen's public health. So different strategies used to their development. Observing traffic, environment, function problems in the renovated walkway of Eram of Hamadan, shows the problem of inadequate of t...
We developed Cyber Forensics Ontology for the criminal investigation in cyber space. Cyber crime is classified into cyber terror and general cyber crime, and those two classes are connected with each other. The investigation of cyber terror requires high technology, system environment and experts, and general cyber crime is connected with general crime by evidence from digital data and cyber sp...
Using the general strain theory as a theoretical framework, the present longitudinal study investigated both face-to-face and cyber victimization in relation to cyber-displaced aggression. Longitudinal data were collected from 130 (70 women) young adults who completed measures assessing their victimization (face-to-face and cyber), cyber aggression, and both face-to-face and cyber-displaced agg...
n this article, attempts to review with a developmental approach to cyberbullying, prevalence and risk and protective factors it. In the present narrative review article, which is done by the method of text research, articles about cyberbullying from 2010 to 2020 were published in the Google Scholar, ScienceDirect, Elsevier, Scopus, ProQuest, Springer, and PubMed databases were extracted and an...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید