Challenges to global mineral resource security and options for future supply

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Ontologies for Network Security and Future Challenges

Efforts have been recently made to construct ontologies for network security. The proposed ontologies are related to specific aspects of network security. Therefore, it is necessary to identify the specific aspects covered by existing ontologies for network security. A review and analysis of the principal issues, challenges, and the extent of progress related to distinct ontologies was performe...

متن کامل

supply and demand security of energy in central asia and the caucasus

امنیت انرژی به معنی عرضه مداوم و پایدار همراه با قیمت های معقول در حامل های انرژی، که تهدیدات امنیتی، سیاسی، اقتصادی، محیط زیستی و روانی را کاهش دهد. امروزه نفت و گاز تنها، کالای تجاری نیست بلکه بعنوان ابزار سیاسی مورد استفاده قرار می گیرد.اختلاف میان روسیه و اکراین بر سر انرژی در ژانویه 2006، تهدیدی برای امنیت انرژی اروپا ایجاد کرد. در این تحقیق ما تلاش کردیم که نقش انرژی آسیای میانه و قفقاز ر...

15 صفحه اول

VANETs: Security Challenges and Future Directions

Connected vehicles are equipped with wireless sensors that aid in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication. These vehicles will in the near future provide road safety, improve transport efficiency, and reduce traffic congestion. One of the challenges for connected vehicles is how to ensure that information sent across the network is secure. If security of the n...

متن کامل

Security Automation Research : Challenges and Future Directions

http://iac.dtic.mil/iatac Configuration complexity imposes a heavy burden on both regular users and experienced administrators. This complexity dramatically reduces overall network assurability. For example, a report from the Center for Strategic and International Studies states that “inappropriate or incorrect security configurations were responsible for 80 percent of United States Air Force v...

متن کامل

Mobile Security : Challenges , Lessons , and Future Directions

Mobile computing differs fundamentally from its precursors. Users entrust their devices with troves of privacy-sensitive data. Devices are utilized for both corporate as well as personal purposes. Computation is limited by battery power rather than processor or communication speeds. Devices can join networks at arbitrary locations and leave at any point in time. Consequently the security challe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Geological Society, London, Special Publications

سال: 2014

ISSN: 0305-8719,2041-4927

DOI: 10.1144/sp393.13