نتایج جستجو برای: adversary legal system

تعداد نتایج: 2314073  

Journal: :iranian journal of neurology 0
arian petoft department of public law, school of law and political sciences, allameh tabatabai university, tehran, iran.

neurolaw, as an interdisciplinary field which links the brain to law, facilitates the pathway to better understanding of human behavior in order to regulate it accurately through incorporating neuroscience achievements in legal studies. since 1990's, this emerging field, by study on human nervous system as a new dimension of legal phenomena, leads to a more precise explanation for human behavio...

Journal: :IEEE Transactions on Control of Network Systems 2021

How does system-level information impact the ability of an adversary to degrade performance in a networked control system? complexity adversary's strategy affect its performance? This article focuses on these questions context graphical coordination games where can influence given fraction agents system, and follow log-linear learning, well-known distributed learning algorithm. Focusing class h...

Journal: :International Journal of Foundations of Computer Science 2018

Every day, complaints are filed against the medical staff due to Negligence with health and nervous system inflammation -related issues. Negligence in the legal sense, means that one does not perform assigned task. The task that the legislator has placed on that person. The legislator in the Islamic Penal Code, adopted in 1392, Defines negligence as carelessness or omission and also includes la...

احمدرضا نائینی

بحث تنقیح قوانین و مقررات، از مباحثی است که درحال حاضر محافل علمی را بیش از پیش به خود مشغول کرده؛ و یکی از مباحث مهم تنقیح قوانین و مقررات، بررسی و تشخیص«نسخ ضمنی» مصوبات است. در این مقاله به گوشه‌هایی از مبحث نسخ (آن هم نه نسخ و تغییرات ضمنی، بلکه نسخ و تغییرات صریح)، اکتفا می‌شود. شاید تصور شود که نسخ، اصلاح و الحاق صریح معلوم است و نیازی به بیان آن نیست، اتفاقاً در این تحقیق، دایرة بحث، بیش...

2005
Riccardo Pucella

There are essentially two schools, advocating two general approaches to the problem of reasoning about the security properties of a system. What do I mean by a security property? Examples of these include secrecy (ensuring that only authorized parties get access to a piece of information), integrity (ensuring that messages exchanged between parties are not modified in transit), and authenticity...

Journal: :CoRR 2012
Mohammad Iftekhar Husain Lokesh Mandvekar Chunming Qiao Ramalingam Sridhar

Verified boot is an interesting feature of Chromium OS that should detect any modification in the firmware, kernel or the root file system (rootfs) by a dedicated adversary. However, by exploiting a design flaw in verified boot, we show that an adversary can replace the original rootfs by a malicious rootfs containing exploits such as a spyware and still pass the verified boot process. The expl...

Journal: :CoRR 2015
Zhenqi Huang Yu Wang Sayan Mitra Geir E. Dullerud

We present a controller synthesis algorithm for a discrete time reach-avoid problem in the presence of adversaries. Our model of the adversary captures typical malicious attacks envisioned on cyber-physical systems such as sensor spoofing, controller corruption, and actuator intrusion. After formulating the problem in a general setting, we present a sound and complete algorithm for the case wit...

Journal: :مجله مطالعات حقوق تطبیقی 0
محمد فرجیها استادیار گروه حقوق دانشگاه تربیت مدرس ابوالقاسم بازیار کارشناسی ارشد حقوق جزا و جرم شناسی دانشگاه تربیت مدرس

state compensation to crime victims means paying money by the governmental institutions to victims or his/her families, when restitution by the offender and other financial sources is accessible. in the legal system of england, law of criminal damages includes all aspects of state compensation such as: conditions of eligibility related to victims, crimes, damages, perpetrators as well as proced...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید