نتایج جستجو برای: passive defense
تعداد نتایج: 146155 فیلتر نتایج به سال:
This thesis proposes a value robustness approach to architect defense systems and Systems of Systems (SoS). A value robust system or SoS has the ability to provide continued value to stakeholders by performing well to meet the mission intent under a variety of future contexts. The proposed approach encompasses three methods, namely “Needs to Architecture” framework, Multi-Attribute Tradespace E...
Abstract The defense against plaintiff can be done in two deferent ways: denial of claim and challenging it (substantive defense) and objection to violation of procedural laws (formal or procedural defence). Each of these methods has its own nature and consequences. The subject of this paper is determination the scope of procedural defense and finding a criterion recognizing it from substant...
Resource defense behavior is often explained by the spatial and temporal distribution of resources. However, factors such as competition, habitat complexity, and individual space use may also affect the capacity of individuals to defend and monopolize resources. Yet, studies frequently focus on one or two factors, overlooking the complexity found in natural settings. Here, we addressed defense ...
Incidence and risk factors Septic arthritis is a common consequence of bacteremia and septicemia in foals. In one study, septicemia was the most common cause of death (30%) in foals under 7 days of age. In the same study, septic arthritis was identified as the cause of death in 12.5% of foals aged 8 to 31 days.1 Establishment of infection depends on several factors including host defense, virul...
A “botnet” is a network of computers that are compromised and controlled by an attacker (botmaster). Botnets are one of the most serious threats to today’s Internet. Most current botnets have centralized command and control (C&C) architecture. However, peer-to-peer (P2P) structured botnets have gradually emerged as a new advanced form of botnets. Due to the distributive nature of P2P networks, ...
Intrusion is something which is unsolicited activity and which might be used to interrupt the functions of wireless network. If we talk about wireless networks, having centralized monitoring policy; therefore it is very much easy to detect and eliminate intrusions efficiently. But when we look forward to wireless scenario, especially in the multi hop wireless network, intrusion activities are m...
Abstract Contemporary attachment researchers claim that attachment-anxiety is associated with a hyperactivating defense strategy while attachment-avoidance deactivating strategy. However, to date, no study has comprehensively examined the basic patterns of specific expression in two dimensions insecurity (anxiety/avoidance). To address this research gap, current aimed assess character defenses ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید