نتایج جستجو برای: security

تعداد نتایج: 178415  

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

Journal: :Malaysian Journal of International Relations 2013

Journal: :مطالعات ملی کتابداری و سازماندهی اطلاعات 0
نوشته رابرت کلاس جاپ ترجمه پرویز عازم مدیر کتابخانه عمومی حسینیه ارشاد و مدرس دانشگاه آزاد اسلامی

0

Providing security in the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both te...

Sponge structure is a structure widely used in the design of cryptographic algorithms that reduces the design of the algorithms to the design of a permutation or pseudo-random function. The development of sponge-based algorithms and the selection of designs based on this structure in SHA3 and CAESAR competitions increase the need to examine its security against various types of attacks. In the ...

Journal: :مطالعات آسیای مرکزی و قفقاز 0

security priorities of a country are not only affected by its internal situation, but sometimes regional situation is also a determinant factor of these priorities. the effectiveness of regional situations is especially when the subject country has a growing economy. after the collapse of ussr, the central asia had the same effect on china’s security priorities. china is an emerging global powe...

Journal: :isecure, the isc international journal of information security 0
a. sedaghatbaf school of computer engineering, iran university of science and technology, tehran, iran m. abdollahi azgomi school of computer engineering, iran university of science and technology, tehran, iran

quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. however, an important question arises with respect to the accuracy of input parameters. in practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...

Journal: :مطالعات راهبردی سیاستگذاری عمومی 0
سعید ودادی کلانتر دانشگاه صنعتی شریف عباس ملکی استاد دانشگاه شریف معین احمدی دانشجوی دانشگاه شریف

the promotion of oil and gas industry of a country or region requires foreign and longterm investments. ensuring demand security constitutes one of the major driving forces for promoting investments in oil and gas sectors. our main question is to understand the upcoming energy demand security in the caspian markets. just like supply security, energy demand security cannot be affected mainly by ...

Journal: :international journal of information science and management 0
a. asosheh faculty of engineering tarbiat modares university, tehran, iran p. hajinazari faculty of engineering tarbiat modares university, tehran, iran h. khodkari faculty of engineering university of tehran, iran

nowadays, access to reliable information has become an essential factor leading to success in business. in this regard, adequate security of information and systems that process it is critical to the operation of all organizations. therefore organizations must understand and improve the current status of their information security in order to ensure business continuity and increase rate of retu...

Journal: :فصلنامه علمی پژوهشی علوم سیاسی 0
آیة الله سید نورالدین شریعتمدار جزائری استاد فقه سیاسی در حوزه علمیه قم نجف لک زایی رئیس پژوهشکده علوم و اندیشه سیاسی و استاد فلسفه امنیت در اسلام اصغر افتخاری معاون پژوهشی دانشگاه امام صادق(ع) و از صاحب نظران مباحث امنیتی

.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید