نتایج جستجو برای: security threats

تعداد نتایج: 201039  

Abstract In the wake of the 1979 Islamic Revolution in Iran and the ensuing dominance of political Islam discourse and its impact on Pakistani society, the ground was prepared for the spread of Wahhabism and anti-Shiism in that country due to the failure of the Islamabad government to manage the reactive conduct of extremist Salafist groups as well as its engagement in internal dis...

Journal: :MGIMO Review of International Relations 2014

Journal: :International Journal of Advanced Engineering, Management and Science 2018

Journal: :Advanced Information Systems 2018

Journal: :International Journal of Information and Communication Sciences 2020

Journal: :Journal of Computer Security 2022

Socio-Technical Systems (STSs) combine the operations of technical systems with choices and intervention humans, namely users systems. Designing such is far from trivial due to interaction heterogeneous components, including hardware components software applications, physical elements as tickets, user interfaces, touchscreens displays, notably, humans. While possible security issues about are w...

Journal: :Chettinad health city medical journal 2022

How to cite this article:Bari ABA. Healthcare Facilities and Cyber Security Threats. Chettinad Health City Med J. 2022;11(4):1.

Journal: :International journal of engineering and innovative research 2021

In the ever developing world of technology, mobile applications are increasing day by alongside with cyber threats. This fact is valid as a result shifts from e-government to m-government and classical e-business m-business solutions. Therefore electronic structure government services can be accessed apps using signatures. The main threat personal data that captured malicious codes hence danger...

Journal: :SHS web of conferences 2023

The development of cloud computing and distributed technologies has shifted log management operations to an aggregated form. Diverse information devices as well systems perform data collection status analysis through a unified aggregation system. However, with the increasingly diverse business forms, threats confronted by are also mounting, among which leakage, tampering, loss, security vulnera...

Journal: :Internet of things and cyber-physical systems 2023

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید