نتایج جستجو برای: protection method

تعداد نتایج: 1791871  

Journal: :IOP Conference Series: Materials Science and Engineering 2017

Journal: :Journal of Japan Society of Civil Engineers, Ser. B3 (Ocean Engineering) 2014

Journal: :International Journal on Cyber Situational Awareness 2016

Journal: :International Journal of Computer and Communication Technology 2013

Journal: :Energies 2021

Power utilities worldwide commonly use the radial distribution system because of its advantages being simple in structure and having relatively inexpensive installation costs. It has a disadvantage that power supply reliability is low load side fault section will suffer from an outage event system. However, recently, with ICT (Information Communication Technologies) development, required to be ...

Journal: : 2023

The article proposes the creation of an effective system for detecting and responding to external influences in order minimize consequences breaching protection cloud virtual resources a timely manner. Mathematical models have been improved ensure software-configured networks, namely: mathematical model impact attack on resources, assessing state choosing countermeasure based complex indicator ...

2016
R. Rajeswari

The Access control mechanism avoids the unauthorized access of sensitive information. It protects the user information from the unauthorized access. The privacy protection mechanism is a much important concern in the case of sharing the sensitive information. The privacy protection mechanism provides better privacy for the sensitive information which is to be shared. The generally used privacy ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید