نتایج جستجو برای: threat

تعداد نتایج: 52909  

2004
Sean Lau

............................................................................................................................. ii

Journal: :Wireless Personal Communications 2006
Dimitris Varoutas Dimitris Katsianis Thomas Sphicopoulos Kjell Stordahl Ilari Welling

The paper assesses the market conditions and dynamics, the architectures and the different approaches for deployment of 3G Mobile Virtual Network Operators (MVNOs), in an attempt to address specific advantages and pitfalls. Following the definition of appropriate service sets and tariff structures, and taking into account demand scenarios, a techno-economic model has been developed, in order to...

2015
L. Song Richardson Phillip Atiba Goff

INTRODUCTION .................................................................................................115 I. Implicit Racial Bias ...........................................................................................120 A. In General ....................................................................................................120 B. Implicit Dehumanization ......................

2016
Ronald Breiger Lauren Pinson

Considerable debate in recent years among researchers and policymakers has focused on the growing potential of terrorist groups to acquire and use chemical, biological, radiological, and nuclear (CBRN) materials in attacks. The reliability of analyses of CBRN events is an important concern at two levels: the data on which analyses are based, and the quantitative modeling of those data. At each ...

Journal: :I. J. Network Security 2013
Christos K. Dimitriadis

Mobile operators are organizations that have to manage a great amount of critical information, including legal sensitive subscriber data. A number of assessment projects on the infrastructures of major mobile operators, revealed a number of vulnerabilities that if exploited may lead to important business impact. The scope of this paper is to publish these vulnerabilities towards the enhancement...

2009
Nicholas A. O. Hill Johnston Davidson Isabel Silva Julie Garnier

In recent years there has been much interest in the conservation and tourism value of the Quirimbas Archipelago, Mozambique. Historically, biological and conservation work has been focused on the more accessible southern part of the Quirimbas. This paper is a contribution to the knowledge on the resources in the north of the Quirimbas following survey work conducted around Vamizi Island in 2001...

2012
Alexei Czeskis Jacob Appelbaum

This paper details our experience designing a privacy preserving medical marijuana registry. In this paper, we make four key contributions. First, through direct and indirect interaction with multiple stakeholders like the ACLU of Washington, law enforcement, the Cannabis Defense Coalition, state legislators, lawyers, and many others, we describe a number of intersting technical and socially-im...

Journal: :Cognitive Systems Research 2014
Sarah K. Robins

Debate over the nature of mindreading proceeds on the assumption that theory and simulation offer distinct characterizations of this ability. The threat of collapse objection questions this assumption, suggesting that simulation collapses into theory because both are committed to mindreading as tacit knowledge. Although both sides dismiss this objection, I argue that the threat is real. Theory ...

Journal: :Decision Analysis 2014
Xiaojun Shan Jun Zhuang

D the smuggling of nuclear weapons in container freight is critical. Previous work has suggested that such deterrence could be achieved by retaliation threats and partial inspection. However, pre-event declared retaliation threats may not be credible, causing the desired deterrence not to be achieved. In this paper, we extend and complement the work of Haphuriwat et al. (2011) to model credible...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید