نتایج جستجو برای: data threats

تعداد نتایج: 2432735  

2014
Jason R. C. Nurse Philip A. Legg Oliver Buckley Ioannis Agrafiotis Gordon R. T. Wright Monica T. Whitty David Upton Michael Goldsmith Sadie Creese

Organisations today operate in a world fraught with threats, including “script kiddies”, hackers, hacktivists and advanced persistent threats. Although these threats can be harmful to an enterprise, a potentially more devastating and anecdotally more likely threat is that of the malicious insider. These trusted individuals have access to valuable company systems and data, and are well placed to...

2003
Seongje Cho Chulyean Chang Joonmo Kim Jongmoo Choi

Perfect protection against all system threats is considered to be impossible. The problem of monitoring against the threats has been an issue in literature, but its progress has not yet been met any practical need. Further, the inherent complexity of the problem in terms of any known approaches gives firm impressions that there are no practical solutions, and so fewer challenges have been made ...

Journal: :IJSITA 2014
Loye Lynn Ray Henry Felch

Advanced persistent threats (APTs) have become a big problem for computer systems. Databases are vulnerable to these threats and can give attackers access to an organizations sensitive data. Oracle databases are at greater risk due to their heavy use as back-ends to corporate applications such as enterprise resource planning software. This paper will describe a methodology for finding APTs that...

2015
Jianqiang Xin

........................................................................................................... 4 Document Conventions................................................................................... 4 Introduction.................................................................................................... 5 Overview of VoIP techniques..........................................

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده زبانهای خارجی 1393

the purpose of this study was to examine the english language needs of medical students at tehran university of medical sciences . analysis of the needs took place for three groups: 320 undergraduate students, 30 postgraduate students and 20 university instructors. a triangulation approach to collect data was used in which a combination of the quantitative (using the questionnaires) and qualita...

Journal: :CoRR 2014
Touseef Yousuf Darzi Aminuddin Zabi Pallavi M

Fault control and tolerance in WSN is a challenging problem because of limited energy, bandwidth, and computational complexity. While facing numerous threats these severely resource constrained nodes are responsible for data collection, data processing, localization, time synchronization aggregation and data forwarding. One of the effective approaches to control and tolerate these threats is th...

Journal: :IEEE Security & Privacy Magazine 2007

Journal: :Eos, Transactions American Geophysical Union 1999

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید