نتایج جستجو برای: in partial breach
تعداد نتایج: 17011741 فیلتر نتایج به سال:
Considering wireless sensor networks for border surveillance, one of the major concerns is sensing coverage. Breach probability can be used as a measure to analyze the tradeoffs and to determine the required number of sensors to be deployed to obtain a certain security level. In this paper, the sensing coverage of surveillance wireless sensor networks is studied by utilizing a well-known image ...
In this paper, the sensing coverage area of surveillance wireless sensor networks is considered. The sensing coverage is determined by applying the Neyman-Pearson detection model and defining the breach probability on a gridmodeled field. Using a graph model for the perimeter, Dijkstra’s shortest path algorithm is used to find the weakest breach path. The breach probability is linked to paramet...
Coverage is a measure of the quality of surveillance offered by a given network of sensors over the field it protects. Geometric characterization of, and optimization problems pertaining to, a specific measure of coverage maximal breach form the subject matter of this paper. We prove lower bound results for maximal breach through its geometric characterization. We define a new measure called av...
Introduction A decade has passed since the enactment of data breach notification laws (DBNLs) in numerous U.S. states. These laws mandate companies that have suffered a data breach to inform the customers whose data might have been exposed. The intent of DBNLs can perhaps be best summed up in the phrase: “sunlight is the best disinfectant”. Whether the goal of incentivizing better security prac...
This study explored the relationship between psychological contract breach and ethical decisionmaking intention. Previous studies analyzed the relation mainly from the Western cultural perspective, thus leaving the Eastern context. In this regard, the present study examined the cross-level moderating effect of ethical climate on variables at the individual level. Forty state-owned and private c...
IT managers often struggle to justify investments in information security. In addition to standard quantitative analyses such as Return on Security Investment (ROSI), executive management may also want to know what the effect of potential security breaches would be on the market value of a publicly-traded firm. This study attempts to shed light on the issue by examining the impact of informatio...
As the nation confronts a growing tide of security breaches, the importance of having quality data breach information systems becomes paramount. Yet too little attention is paid to evaluating these systems. This article draws on data quality scholarship to develop a yardstick that assesses the quality of data breach notification systems in the U.S. at both the state and national levels from the...
Worldwide 83% of large dams are embankment structures (ICOLD, 1984), and the proportion is even greater for small dams. Embankment overtopping and breach is an important issue, and the Discusser congratulates the Author for his worthwhile contribution which complements the comprehensive study of Coleman et al. (2002). This discussion is focused on the breach development stage. It is shown that ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید