نتایج جستجو برای: have always brought about security challenge
تعداد نتایج: 3825509 فیلتر نتایج به سال:
High availability is no longer just a business continuity concern. Users are increasingly dependant on devices that consume and produce data in ever increasing volumes. A popular solution is to have a central repository which each device accesses after centrally managed authentication. This model of use is facilitated by cloud based file synchronisation services such as Dropbox, OneDrive, Googl...
Thirty years ago, most biochemical and molecular science concerned what went on inside cells. Hence, release of enzymes into the extracellular space was seen as important only for specialised functions, such as digestion of nutrients or in blood clotting, events that took place outside solid tissues. Moreover, the discovery of ectoenzymes–enzymes with their active sites pointing to the extracel...
wireless sensor networks (wsns) are one of the most interesting consequences of innovations in different areas of technology including wireless and mobile communications, networking, and sensor design. these networks are considered as a class of wireless networks which are constructed by a set of sensors. a large number of applications have been proposed for wsns. besides having numerous applic...
This article presents the key insights about the environment and security links in the context of the Persian Gulf region. This research paper focuses on the challenge of finding a balance among development, armed conflicts and environmental degradation in the Persian Gulf region. Environmental security challenges are human security, sustainable development and regional cooperation in the Persi...
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
The protection of IPRs in agriculture and its related areas affects food security directly and indirectly. Right to Food and IPRs has both recognized in human rights instruments and states have the duty to protect and provide these rights. However the approaches about the relationship between IPRs and food security have been inconsistent so far. This inconsistency about the interaction between ...
Cyber security threats and attacks are greatly affecting the security of critical infrastructure, industrial control systems, and Supervisory Control and Data Acquisition (SCADA) control systems. Despite growing awareness of security issues especially in SCADA networks, there exist little or scarce information about SCADA vulnerabilities and attacks. The emergence of Internet and World Wide Web...
Security of the computer system and network is at continual risk due the progressive technological advancements in the field of information security. This concern has brought up the necessity of a system or mechanism which constantly keeps an eye on the illegitimate activities. Several mechanisms have been proposed for this purpose, namely antivirus, firewall, intrusion detection system etc. In...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید