نتایج جستجو برای: security analysis

تعداد نتایج: 2963315  

Journal: :International Journal of Advanced Information Technology 2012

Journal: :INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 2014

Journal: :معماری و شهرسازی 0
قاسم مطلبی استادیار دانشکده معماری پردیس هنرهای زیبا، دانشگاه تهران فاطمه خدادادی آق قلعه کارشناسی ارشد معماری، دانشگاه سوره، تهران علی اکبری دانشجوی دکتری معماری، دانشگاه آزاد اسلامی واحد تهران مرکزی، تهران

security is one of the most important human needs. researchers believe that the need for security has a strong and close relationship with the physical characteristics of the environment and people’s satisfaction. to study the relationship between security and environmental (physical and social) satisfaction, ‘’cpted’’ approach and its principals in design and environmental planning and urban l...

Journal: :shiraz journal of system management 0
sana javid department of management, college of management and accounting, sistan & baluchistan university, sistan & baluchistan, iran nour mohammad yaghoubi department of management, college of management and accounting, sistan & baluchistan university, sistan & baluchistan, iran

in recent years, many security threats have entered into the organizations’ information and changed the  organizational performance resulting in their exorbitant costs. this question is of particular importanceabout government agencies that use information and internet systems. this issue enabled the top managers of organizations to implement a security system and minimize these costs. using in...

ژورنال: طب جانباز 2019
Bagherian Kakhki , M., Namani , E.,

Aims: After the end of the war and the return of the warriors to the family, due to the stresses of the war and its devastating effect on the spirit and soul of the veterans, the adverse effects of war on the family, especially the spous, continue.The aim of this study was to investigate the mediating role of psychological security in the relationship between optimism and self-compassion with p...

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

ژورنال: مدیریت شهری 2016
Bemanian, Mohammad Reza , Kameli , Mohsen , Ramazi, Farzane ,

Security has always been one of the most basic needs of human and improves social interactions, personal and social peace, prosperity of the people and thus caused the improvement of society. Modern urban spaces admitting to crimes and aberrations resulting in lack of security in the city, Security Survey in urban areas is an important issue. This paper examined the impact of residents' sense o...

2007
HUA CHEN TAO ZOU DONGXIA WANG

The security of information systems has been the focus because of network applications. Vulnerability analysis is widely used to evaluate the security of a system to assure system security. With the help of vulnerability analysis, the security risk of a system can be predicted so that the countermeasures are arranged in advance. These will promote system security effectively. The object of vuln...

2006
Igor Kotenko Mikhail Stepashkin

The approach to network security analysis is suggested. It is based on simulation of malefactor’s behavior, generating attack graph and calculating different security metrics. The graph represents all possible attack scenarios taking into account network configuration, security policy, malefactor’s location, knowledge level and strategy. The security metrics describe computer network security a...

Anatolii Mysyk Ivan Tkach Kateryna Plutytska Serhii Drobotov Svitlana Bondarenko,

The purpose of this study is theoretical and methodological substantiation, deepening of conceptual provisions and development of scientific and practical recommendations for the formation of an integrated sector of national security and defense based on the principles of national resilience. The relevance of this study is due to the need to build national resilience to address the main problem...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید