نتایج جستجو برای: adversary legal system
تعداد نتایج: 2314073 فیلتر نتایج به سال:
neurolaw, as an interdisciplinary field which links the brain to law, facilitates the pathway to better understanding of human behavior in order to regulate it accurately through incorporating neuroscience achievements in legal studies. since 1990's, this emerging field, by study on human nervous system as a new dimension of legal phenomena, leads to a more precise explanation for human behavio...
How does system-level information impact the ability of an adversary to degrade performance in a networked control system? complexity adversary's strategy affect its performance? This article focuses on these questions context graphical coordination games where can influence given fraction agents system, and follow log-linear learning, well-known distributed learning algorithm. Focusing class h...
Every day, complaints are filed against the medical staff due to Negligence with health and nervous system inflammation -related issues. Negligence in the legal sense, means that one does not perform assigned task. The task that the legislator has placed on that person. The legislator in the Islamic Penal Code, adopted in 1392, Defines negligence as carelessness or omission and also includes la...
بحث تنقیح قوانین و مقررات، از مباحثی است که درحال حاضر محافل علمی را بیش از پیش به خود مشغول کرده؛ و یکی از مباحث مهم تنقیح قوانین و مقررات، بررسی و تشخیص«نسخ ضمنی» مصوبات است. در این مقاله به گوشههایی از مبحث نسخ (آن هم نه نسخ و تغییرات ضمنی، بلکه نسخ و تغییرات صریح)، اکتفا میشود. شاید تصور شود که نسخ، اصلاح و الحاق صریح معلوم است و نیازی به بیان آن نیست، اتفاقاً در این تحقیق، دایرة بحث، بیش...
There are essentially two schools, advocating two general approaches to the problem of reasoning about the security properties of a system. What do I mean by a security property? Examples of these include secrecy (ensuring that only authorized parties get access to a piece of information), integrity (ensuring that messages exchanged between parties are not modified in transit), and authenticity...
Verified boot is an interesting feature of Chromium OS that should detect any modification in the firmware, kernel or the root file system (rootfs) by a dedicated adversary. However, by exploiting a design flaw in verified boot, we show that an adversary can replace the original rootfs by a malicious rootfs containing exploits such as a spyware and still pass the verified boot process. The expl...
We present a controller synthesis algorithm for a discrete time reach-avoid problem in the presence of adversaries. Our model of the adversary captures typical malicious attacks envisioned on cyber-physical systems such as sensor spoofing, controller corruption, and actuator intrusion. After formulating the problem in a general setting, we present a sound and complete algorithm for the case wit...
state compensation to crime victims means paying money by the governmental institutions to victims or his/her families, when restitution by the offender and other financial sources is accessible. in the legal system of england, law of criminal damages includes all aspects of state compensation such as: conditions of eligibility related to victims, crimes, damages, perpetrators as well as proced...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید