نتایج جستجو برای: cyber space
تعداد نتایج: 509520 فیلتر نتایج به سال:
With the development of information and communication technology, the need for the plaintiffs and the use of paper has decreased in the process of proceedings, but this type of trial has many legal and executive challenges. The present research in purpose view, applied and in terms of methodology is descriptive-analytic which seeks to analyze the legal and enforcement challenges of electronic j...
Cyber threats have been extraordinary increased in recent years. Cyber attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...
Abstract The purpose of the study is to determine main forms behavior participants political process in information space Ukraine and progressive informative countries world order achieve goals decisions that have a constructive or destructive function system, considering social, cultural, legal, ideological factors affect interaction during confrontation processes cyberspace. subject concept m...
Ensuring trust in cyber space has become an important and indispensable security challenge. Questions about trust in the physical space can be answered based on the factors namely closeness, time, analyzing actions and body language. But in the cyber space these factors are not readily available correctly to ensure and verify trust. Trust can also be established via a third party. But can we kn...
application of ipr and the right of investigation about the claim of its infringement, need issuing some protective orders. mostly, this is for avoiding destruction of evidences which can be effective in proving the right of the plaintiff. the purpose of this study is to find out how can protect the third party’s right of privacy in the process of ipr enforcement. in common law, there are two i...
Nuclear Power Plants (NPPs) become one of the most important infrastructures in providing efficient and non-interrupted electricity in a country using radioactive elements due to global warming and shortage of fossil resources. To provide the higher reliability and better performance with additional diagnostic capabilities in operating NPPs, digital Instrumentation and Control (I&C) systems hav...
Ubiquitous Computing is considered an information technology that fuses real space and cyber space based on the networks among existing things in the real world. Advances in ubiquitous have been topics in so much researches. In this paper, we analyze security threats of mobile computing devices with an application of ubiquitous computing and we suggest their countermeasures in technical, manage...
Medical Cyber-Physical Systems (MCPS) integrate the cyber space and physical world elements for promoting support for health assurance activities. MCPS are life-critical systems, demanding a strong engineering effort to guarantee safety, what directly impacts on testing process. Testing MCPS using real patients is very expensive and complex, since their lives are involved. Thus, the use of pati...
This research work is to bring to light, the danger posed by Cyber Crime in the world generally and Nigeria in particular with the hope that policy makers will work with the recommendations and practical combating framework design of this research work. In order to achieve this, the following approaches were adopted; survey of some common Cybercrime in Nigeria with the frequency of occurrence a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید