نتایج جستجو برای: security sense

تعداد نتایج: 322501  

ژورنال: پیاورد سلامت 2013
دلگشایی, بهرام, شاه بهرامی, الهام, طباطبایی, سید سعید , نصیری پور, امیر اشکان , کلهر, روح الله , کیایی, محمد زکریا ,

Background and Aim: The Effectiveness and success of an organization depends on two factors one is the employees’ Performances and the other is the level of understanding between managers and employees in prioritize of different job motivators. The aim of this study was to determine factors that affect staffs’ performances in Qazvin teaching hospitals based on the Herzberg’s theory. Materials a...

2010
Benjamin Johnson Jens Grossklags Nicolas Christin John C.-I. Chuang

A common assumption in security research is that more individual expertise unambiguously leads to a more secure overall network. We present a game-theoretic model in which this common assumption is challenged. Our findings indicate that expert users can be not only invaluable contributors, but also free-riders, defectors, and narcissistic opportunists. A direct application is that user educatio...

2011
Benjamin Johnson Jens Grossklags Nicolas Christin John Chuang

A common assumption in security research is that more individual expertise unambiguously leads to a more secure overall network. We present a game-theoretic model in which this common assumption does not hold. Our findings indicate that expert users can be not only invaluable contributors, but also free-riders, defectors, and narcissistic opportunists. A direct application is that user educatio...

2015
Max Steiner Peter Liggesmeyer

Component fault trees that contain safety basic events as well as security basic events cannot be analyzed like normal CFTs. Safety basic events are rated with probabilities in an interval [0,1], for security basic events simpler scales such as {low, medium, high} make more sense. In this paper an approach is described how to handle a quantitative safety analysis with different rating schemes f...

2005
Seiji Doi Yoshifumi Manabe

This paper shows that the security of blind signatures is, as defined by Juels, Luby and Ostrovsky, truly weaker than the security in the universal composability (UC) framework (i.e., define the ideal functionality of blind signatures), which was introduced by Canetti. That is, we formulate the security of blind signatures in the UC framework, and show that the class of UC-secure blind signatur...

Background: Social network in older adults refers to the interpersonal relationships and the perception of these relationships. Given the importance of the social network, the current study was conducted to answer three pivotal questions. First, do personal and district factors affect the social network of the elderly? Second, how much share do the personal and district factors have in the soci...

2001
Heiko Mantel Andrei Sabelfeld

The security of computation at the level of a specific programming language and the security of complex systems at a more abstract level are two major areas of current security research. With the objective to integrate the two, this article proposes a translation of a timing-sensitive security property for simple multi-threaded programs into a more general security framework. Interestingly, our...

Journal: :Electronics 2021

The paper presents an overview of current and expected prospects for the development artificial intelligence algorithms, especially in military applications, conducted research regarding applications area civilian life. Attention was paid mainly to use AI algorithms cybersecurity, object detection, logistics robotics. It discusses problems connected with present solutions how can help solve the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید