نتایج جستجو برای: data threats

تعداد نتایج: 2432735  

2006
Tracy Magee Susan M. Lee Karen K. Giuliano Barbara Munro

b Background: An unprecedented amount of data from a variety of disciplines containing variables of interest to nursing are available to nurse researchers. In response, the use of large data sets is emerging as a legitimate method that can help facilitate the translation of knowledge to practice. b Objective: To explore the spectrum of methodological issues and practical applications encountere...

2003
Dijiang Huang

There are several security threats that are not addressed or partially addressed in current link state routing protocol. We propose a new framework for secure link state routing protocol based on two cryptographic countermeasures: informationlevel data origin authentication and information-level confidentiality. This new framework constructs multiple virtual trust routing domains (VTRD) to cons...

Journal: :محیط شناسی 0
عباس مصلّی نژاد

security building processes after world war ii, were under the influence of realistic thoughts. this was considered a reaction to idealistic and institutional approaches. critical school attempted to criticize classical and structural realism. new security theoreticians emphasize on extended subjects and diverse threats and believe it to be beyond the competition of countries. they believe that...

Journal: :Data Science Journal 2010
Simon C. Lambert

Scientific research is supported by infrastructure, and e-infrastructure is one part of this. Repositories of data are a part of the e-infrastructure and have their own particular needs arising from the requirement for permanence of their data holdings. There are many threats to permanence, and there is a growing awareness of these threats and how they may be countered. Current Research Informa...

2010
Mike Ter Louw Karthik Thotta Ganesh V. N. Venkatakrishnan

Web publishers frequently integrate third-party advertisements into web pages that also contain sensitive publisher data and end-user personal data. This practice exposes sensitive page content to confidentiality and integrity attacks launched by advertisements. In this paper, we propose a novel framework for addressing security threats posed by third-party advertisements. The heart of our fram...

2012
Kevin Crowston

Amazon Mechanical Turk (AMT), a system for crowdsourcing work, has been used in many academic fields to support research and could be similarly useful for information systems research. This paper briefly describes the functioning of the AMT system and presents a simple typology of research data collected using AMT. For each kind of data, it discusses potential threats to reliability and validit...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده صنایع و سیستمها 1387

فعالیت های نگهداری و تعمیرات اطلاعاتی را تولید می کند که می تواند در تعیین زمان های بیکاری و ارایه یک برنامه زمان بندی شده یا تعیین هشدارهای خرابی به پرسنل نگهداری و تعمیرات کمک کند. وقتی که مقدار داده های تولید شده زیاد باشند، فهم بین متغیرها بسیار مشکل می شوند. این پایان نامه به کاربردی از داده کاوی برای کاوش پایگاه های داده چندبعدی در حوزه نگهداری و تعمیرات، برای پیدا کردن خرابی هایی که موجب...

2014
Ramandeep Kaur Anshuman Sharma Anurag Gupta Jagmohan Mago Elisa Bertino Ravi Sandhu Jiping Xiong Lifeng Xuan Jian Zhao Tao Huang Shelly Rohilla Pradeep Kumar Mittal Shamkant B. Navathe

A database-management system (DBMS) is a collection of correlated data and a set of programs to access correlated data. The collection of data, usually referred to as the database, contains information able to an enterprise. And hence the concept of security lies with-in. As the database contains all information relevant to particular enterprise, so it's very important to be in safe side t...

Journal: :Archives of pediatrics & adolescent medicine 2001
S Kostinsky E O Bixler P A Kettl

BACKGROUND Following the April 20, 1999, massacre at Columbine High School, Littleton, Colo, school administrators, law enforcement officials, and the media reported a rash of successive bomb threats and threats of school violence that were attributed to imitation. OBJECTIVE To establish that the clustering of threats of school violence following the Columbine massacre was initiated by imitat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید