نتایج جستجو برای: unauthorized tissues

تعداد نتایج: 198978  

Journal: :International Journal of Safety and Security Engineering 2011

Journal: :IOP Conference Series: Materials Science and Engineering 2021

Journal: :E3S web of conferences 2023

Economic advancement of society is accompanied by social phenomena various nature. Hence, there a need for legal regulation such relations: characterization relations; definition the parties, regime matter those relations, plus sanctioning non-performance or improper performance law. The paper discusses legalization unauthorized construction objects that entails to study in theory possibility r...

2004
Souhila Kaci Abdeslam Ali-Laouar Frédéric Cuppens

In this paper, we address the problem of unauthorized inference of confidential information in the field of health care and social information systems. More precisely, we will focus on the problem of inference control of confidential information from statistical databases which contain information about patients and propopse a method based on fuzzy logic to avoid unauthorized inference. Informa...

Journal: :Psychological reports 2014
Reidar Ommundsen Kees Van der Veer Knud S Larsen Dag-Erik Eilertsen

In the U.S. media, unauthorized immigrants are often interchangeably referred to as "illegal aliens," "illegal immigrants," and undocumented immigrants." In spite of formal equivalence, these terms carry different connotations, but the effects of these labels on people's attitudes toward immigrants are not well documented. In this replication study, 274 undergraduate students in psychology resp...

2017
Gaurav Bansal Ellyn Hansen Lijun Chen

Using the attribution Theory, the study examines the relative trust loss in a hacking versus unauthorized information sharing by a Website. An experiment was conducted in which the respondents were asked to view a website and answer questions related to their trust, at two different phases both before and after reading the news scenario. The results of the study show that users experience signi...

Journal: :JIP 2012
Ervianto Abdullah Satoshi Fujita

The objective of Peer-to-Peer Content Delivery Networks is to deliver copyrighted contents to paid clients in an efficient and secure manner. To protect such contents from being distributed to unauthorized peers, Lou and Hwang proposed a proactive content poisoning scheme to restrain an illegal download conducted by unauthorized peers, and a scheme to identify colluders who illegally leak the c...

2007
Mike Burmester Breno de Medeiros

Low-cost RFID tags are already being used for supply chain management and are a promising new technology that can be used to support the security of wireless ubiquitous applications. However current RFID technology is designed to optimize performance, with less attention paid to resilience and security. In this paper we analyze some of the most common types of attack on RFID tags: unauthorized ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید