نتایج جستجو برای: keywords national security

تعداد نتایج: 2442661  

Journal: :European Journal of Cultural Studies 2021

Journal: :Bioscope: South Asian Screen Studies 2021

Journal: :International Journal of Corpus Linguistics 2022

Abstract This paper applies a new approach to the identification of discourses, based on Multiple Correspondence Analysis (MCA), study discourse variation over time. The MCA keywords deals with major issue use identify discourses: allocation individual multiple discourses. Yet, as this demonstrates, also allows us observe in prevalence discourses texts patterns keyword co-occurrence. Metadata c...

2007
Neil Daswani Dan Boneh Hector Garcia-Molina Andreas Paepcke

In this paper, we introduce the novel concept of a secure interface deenition compiler (a \se-curity" compiler, for short). We show how interface designers can declare an application's security requirements as part of the interface deenition process, and how a security compiler can automatically generate code that implements security requirements in client stubs and server skeletons. We propose...

Journal: :CoRR 2009
Chia-Mu Yu Chun-Shien Lu Sy-Yen Kuo

Sensor networks are vulnerable to false data injection attack and path-based DoS (PDoS) attack. While conventional authentication schemes are insufficient for solving these security conflicts, an en-route filtering scheme acts as a defense against these two attacks. To construct an efficient en-route filtering scheme, this paper first presents a Constrained Function based message Authentication...

Journal: :فصلنامه علمی پژوهشی علوم سیاسی 0
حسین عصاریان نژاد معاون پژوهش و تولید علم دانشگاه عالی دفاع

.

Journal: :Vision Research 2006

Authors are requested to select key words from the following list. You may use plurals and adjectives for combinations like absolute pupillary response, centrifugal optic nerve, inter blobs, etc. If key words are needed which do not appear in this list, please underline them. For animal classification the Latin nomenclature should be used. p-mechanism A-scan a-wave aberration absolute absorptio...

2012
F. Gonzales Gordon W. Romney Pradip Peter Dey

A virtualized and virtual approach is presented on academically preparing students to successfully engage at a strategic perspective to understand those concerns and measures that are both structured and not structured in the area of cyber security and information assurance. The Master of Science in Cyber Security and Information Assurance (MSCSIA) is a professional degree for those who endeavo...

2010
G. K. Pradhan

To facilitate users to interact with and share information without difficulty and faultlessly across various networks and databases nationwide, a secure and trusted information-sharing environment has been recognized as an imperative requirement and to advance homeland security effort. The key incentive following this research is to build a secure and trusted information-sharing approach for go...

2015
Saleh Al-umaran

The study of organisations’ information security cultures has attracted scholars as well as healthcare services industry to research the topic and find appropriate tools and approaches to develop a positive culture. The vast majority of studies in Saudi national health services are on the use of technology to protect and secure health services information. On the other hand, there is a lack of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید