Challenges to global mineral resource security and options for future supply
نویسندگان
چکیده
منابع مشابه
Ontologies for Network Security and Future Challenges
Efforts have been recently made to construct ontologies for network security. The proposed ontologies are related to specific aspects of network security. Therefore, it is necessary to identify the specific aspects covered by existing ontologies for network security. A review and analysis of the principal issues, challenges, and the extent of progress related to distinct ontologies was performe...
متن کاملsupply and demand security of energy in central asia and the caucasus
امنیت انرژی به معنی عرضه مداوم و پایدار همراه با قیمت های معقول در حامل های انرژی، که تهدیدات امنیتی، سیاسی، اقتصادی، محیط زیستی و روانی را کاهش دهد. امروزه نفت و گاز تنها، کالای تجاری نیست بلکه بعنوان ابزار سیاسی مورد استفاده قرار می گیرد.اختلاف میان روسیه و اکراین بر سر انرژی در ژانویه 2006، تهدیدی برای امنیت انرژی اروپا ایجاد کرد. در این تحقیق ما تلاش کردیم که نقش انرژی آسیای میانه و قفقاز ر...
15 صفحه اولVANETs: Security Challenges and Future Directions
Connected vehicles are equipped with wireless sensors that aid in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication. These vehicles will in the near future provide road safety, improve transport efficiency, and reduce traffic congestion. One of the challenges for connected vehicles is how to ensure that information sent across the network is secure. If security of the n...
متن کاملSecurity Automation Research : Challenges and Future Directions
http://iac.dtic.mil/iatac Configuration complexity imposes a heavy burden on both regular users and experienced administrators. This complexity dramatically reduces overall network assurability. For example, a report from the Center for Strategic and International Studies states that “inappropriate or incorrect security configurations were responsible for 80 percent of United States Air Force v...
متن کاملMobile Security : Challenges , Lessons , and Future Directions
Mobile computing differs fundamentally from its precursors. Users entrust their devices with troves of privacy-sensitive data. Devices are utilized for both corporate as well as personal purposes. Computation is limited by battery power rather than processor or communication speeds. Devices can join networks at arbitrary locations and leave at any point in time. Consequently the security challe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Geological Society, London, Special Publications
سال: 2014
ISSN: 0305-8719,2041-4927
DOI: 10.1144/sp393.13