نتایج جستجو برای: defense behavior

تعداد نتایج: 690602  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده فنی مهندسی 1385

خریداران عموماً در مورد کالاها براساس ویژگیهای بیرونی (extrinsic cues) آنها قضاوت می کنند ، به ویژه هنگامیکه سنجش ویژگیهای ذاتی کالا مشکل باشد. به همین علت است که کشـور سـازنده کـالـا، (country of origin or coo) ، یکی از این ویژگیهای بیرونی محصول ، عموماً برای ارزیابی کالاهای خارجی مورد استفاده قرار میگیرد. اثرات کشور سازنده کالا در حوزه رفتار خرید مصرف کننده (consumer buying behavior)بطور گسترده...

2011
Qian Zhou Jiong Yu Feiran Yu

Because of the dynamic and open characteristics of the cloud computing, continuing malicious attacks happen frequently. Combining the idea of trusted cloud, a trust-based defensive system model for cloud computing has been constructed to guarantee the cloud security. Through real-timely monitoring, users’ behavior evidences have been obtained and standardized; a new method for users’ trust eval...

2011
Louis Ernesto Mora

This study explored how religious fundamentalism related to irrational beliefs and primitive defense mechanisms. We also explored how the personality factors of openness to experience and neuroticism moderated these relations. Participants (N = 120) were recruited in an urban area from a Northeastern university, a psychotherapy center, and through Internet advertising. The results demonstrated ...

Journal: :پژوهش های روانشناسی بالینی و مشاوره 0

abstract the aim of the present study was to compare defense mechanisms of patients with major depression, anxiety disorders, and normal individuals. a total of 224 individuals (87 depressed, 64 anxious, 73 normal) participated in this study, voluntarily. following a psychiatric diagnosis of the psychological disorders, all participants were asked to complete the defense style questionnaire (ds...

2011
Kristoffel Grechenig Martin Kolmar

The modern state has monopolized the legitimate use of force. This concept is twofold. First, the state is empowered with enforcement rights; second, the rights of the individuals are (partly) restricted. In a simple model of property rights with appropriation and defense activity, we show that a restriction of private enforcement is beneficial for the property owner, even if there are no econo...

Journal: :CoRR 2017
Avi Pfeffer Brian E. Ruttenberg Lee Kellogg Michael Howard Catherine Call Alison O'Connor Glenn Takata Scott Neal Reilly Terry Patten Jason Taylor Robert Hall Arun Lakhotia Craig Miles Daniel Scofield Jared Frank

Artificial intelligence methods have often been applied to perform specific functions or tasks in the cyber– defense realm. However, as adversary methods become more complex and difficult to divine, piecemeal efforts to understand cyber–attacks, and malware–based attacks in particular, are not providing sufficient means for malware analysts to understand the past, present and future characteris...

Journal: :Cybersecurity 2023

Abstract Recently, deep neural networks have been shown to be vulnerable backdoor attacks. A is inserted into via this attack paradigm, thus compromising the integrity of network. As soon as an attacker presents a trigger during testing phase, in model activated, allowing network make specific wrong predictions. It extremely important defend against attacks since they are very stealthy and dang...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید