نتایج جستجو برای: security model

تعداد نتایج: 2246841  

Journal: :Prikladnaya diskretnaya matematika 2008

Journal: :International Journal of Advanced Computer Science and Applications 2016

Journal: :اقتصاد و توسعه کشاورزی 0
علیرضا نیکوئی منصور زیبایی

irrigated agriculture is an important contributor to the expansion of national food supplies and is expected to play a major role in food security of developing countries. such countries face water crisis for securing the food staples. well designed water resource policies potentially can improve the water allocation and use efficiency as well as the food security objectives. this paper present...

Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with stru...

Background: Achievement of food security has become one of the major challenges of most developing countries, including Zimbabwe. This study was designed to investigate the effect of agricultural commercialization on household food security. Methods: This study used cross-sectional data for the 2017/18 farming season collected from 165 smallholder farmer households in Zhombe north rural distric...

Journal: :Future Internet 2013
Igor V. Kotenko Olga Polubelova Andrey Chechulin Igor Saenko

The technology of Security Information and Event Management (SIEM) becomes one of the most important research applications in the area of computer network security. The overall functionality of SIEM systems depends largely on the quality of solutions implemented at the data storage level, which is purposed for the representation of heterogeneous security events, their storage in the data reposi...

2012
Yan Li

Security testing and security risk analysis are key issues and central to strengthening the ability of companies to face the new security challenges posed by the future internet. We present a conceptual framework clarifying the notions of security testing, security risk analysis, and related concepts, as well as defining the relations among them. The conceptual framework is built upon establish...

2015
Saurabh Mishra Anjali Srivastava

Information Security has become a significant concern for today’s organizations. The internal security threats acts as the most curtail type of security threat within an organization. These internal security threats are a result of poor conduct of security behavior by the employees within an organization. If not deal properly, it may hamper the auditing of organization. Auditing plays an import...

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید