نتایج جستجو برای: unsecured existence
تعداد نتایج: 179118 فیلتر نتایج به سال:
A botnet is one of the most dangerous forms security issues. It infects unsecured computers and transmit malicious commands. By using botnet, attacker can launch a variety attacks, such as distributed denial service (DDoS), data theft, phishing. The may contain lot infected hosts its size usually large. In this paper, we addressed problem detection based on network’s flows records activities in...
The rate of households filing for personal bankruptcy soared in the past two decades, spurring extensive investigations on its causes and policy implications. Recent research suggests that the driving factor may be the sharp decrease in the cost of providing credit, especially unsecured credit cards, to the borrowers that would be not served by traditional lenders (e.g., Livshits, MacGee, and T...
We analyze an exchange economy of unsecured credit where borrowers have the option to declare bankruptcy in which case they are temporarily excluded from financial markets. Endogenous credit limits are imposed that are just tight enough to prevent default. Economies with temporary exclusion differ from their permanent exclusion counterparts in two important properties. If households are extreme...
This paper shows that corporate debt type, maturity and priority structures and their determinants are not homogeneous across firms of different size. Small firms use leasing and bank loans and overdraft while large companies rely on loan capital, convertible and subordinated loans. Small companies depend more on secured debt while large companies’ debt is unsecured and subordinated. The result...
Data that is transient over an unsecured wireless network is always susceptible to being intercepted by anyone within the range of the wireless signal. Hence providing secure communication to keep the user’s information and devices safe when connected wirelessly has become one of the major concerns. Quantum cryptography provides a solution towards absolute communication security over the networ...
An efficient emerging network and secured hopping scheme employed over the unsecured public channels
defaulted bonds is defensible on the grounds that they have a reasonably important bearing on an investment decision. It is harder to make such a case for investors’ scrutiny of the annual, quarterly, and monthly fluctuations in recovery rates. As we shall show, the short-run variability of recovery rates, particularly within priority classes (senior secured, senior unsecured, subordinated) con...
Currently, two different approaches are being pursued for securing the Internet with respect to commercial use on a broad scale. The properties of these two approaches – application coupled security vs. network coupled security – will be discussed and compared. We will then focus on SKIP as an example for network coupled security, and show how it can be used to provide easily upgradable ‘plug &...
Virtual Private Networks (VPNs) are widely recommended to provide security for otherwise unsecured industrial and SCADA communication protocols. VPNs provide confidentiality, integrity, and availability and are often considered secure. However, implementation vulnerabilities and protocol flaws have exposed VPN weaknesses in many deployments. In this work, we use probabilistic modeling to evalua...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید