نتایج جستجو برای: deterrence and securing social defense
تعداد نتایج: 16953888 فیلتر نتایج به سال:
short story as an important literary genre in the recent decade is focused by many of young writers and literary critical with searching structure, content , artistic techniques and cognitive phenomenon of these works , we can show quantity of using some parts of storied literature from new literal techniques of the word and also we can show the usage of native, cultural and social foundation...
The AUKUS agreement is the first in history to allow a non-nuclear country have nuclear-powered submarines, but not nuclear weapons. It pushes Australia–UK–US alliance level of closer military, scientific, and industrial community outlines prototype for new “maritime alliance.” internal relationship this alliance, more it will estrange China. seeks create “de-Sinicized” defense industry chain h...
Table A1. Accountability Theory and Deterrence Theory Compared Element Deterrence Theory Accountability Theory Objective of theory Explains how to reduce antisocial behaviors. Explains how to reduce antisocial behaviors or increase prosocial behaviors. Central mechanism Sanctions. Self-image preservation and social desirability. External component Externally imposed sanctions. Person or organiz...
from 1950s onward, new theories and critical approaches burgeoned across humanities. these theories were context-oriented; as a result, the analysis of discursive practices gained significance. thus, social, political, historical and cultural discourses that have been hitherto marginalized and considered inferior to literary texts, were introduced as important texts to be analyzed by critics. o...
Software installation provides an attractive entry vector for malware: since installations are performed with administrator privileges, malware can easily get the enhanced level of access needed to install backdoors, spyware, rootkits, or “bot” software, and to hide these installations from users. Previous research has been focused mainly on securing the execution phase of untrusted software, w...
this thesis is an evaluation of poetry of sylvia plath (1932- 1963) and forough farrokhzad (1935-1967) using feminist approach and finds the positive concepts of hope, reason and strength through feminine images in their poetry. plath and farrokhzad are from different cultures and different countries but they share the same concepts and themes in their poetry. by applying feminist theory to the...
This article considers the design and analysis of multiple moving target defenses for recognizing isolating attacks on cyber-physical systems. We consider attackers who perform integrity some set sensors actuators in a control system. In such cases, it has been shown that model aware adversary can carefully attack vectors to bypass bad data detection identification filters while causing damage ...
When this commentary was submitted in April 2014, only a handful of scholars and policy-makers in the defense and security communities were following the Ebola outbreak in West Africa, which was over 4 months old at that time. Now that thousands of people have died, cases have spread to the US and Europe, and thousands of US uniformed military are being deployed on humanitarian assistance/disas...
The effectiveness of capital punishment in deterring homicides has remained unclear despite the fact that the Supreme Court’s moratorium on capital punishment and the subsequent adoption of capital punishment by a subset of states, combined with very different rates of execution across polities, would appear to be an ideal environment for revealing deterrence effects using panel data methods. O...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید