نتایج جستجو برای: security analysis

تعداد نتایج: 2963315  

Journal: :International Journal of Security and Its Applications 2013

Journal: :JSW 2016
Yan Zhang Zhoujun Li Dianfu Ma

Revealing security vulnerabilities is one of great challenges for the Android ecosystem. Static analysis is the usual approach of the security analysis for computer software. However, it is undirected and time-consuming for the common static analysis methods to analyze the entire Android application systematically from the main entry point. In order to adapt to the event-driven feature of Andro...

2012
Anshu Tripathi Umesh Kumar Singh

Security is often viewed as an arms race between attackers, who try to exploit vulnerabilities and security administrators, who try to protect system against these attacks. In this regard, analysis of emerging security trends can be helpful in planning proper countermeasures to ensure security. Several studies and surveys exist that provide statistical information on security trends and issues....

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

درویشی, علی, دهنویه, رضا, مهرالحسنی, محمد حسین, گودرزی, رضا,

Background and Objectives: Efficiency measurement can be used for all decision-makers and planners for useful resource allocation. Social Security Organization as a health service provider, provides part of health care services in indirect sector. This study aimed to assess the performance of provincial units of Social Security Organization in the indirect health services sector. Methods: Th...

associated with this condition among summer crop growers in Shoushtar Township, Khouzestan Province, Iran. This cross-sectional survey study was conducted from September 2015 to February 2017. The population consisted of summer crop farmers in the Shoushtar Township (N=850). The sample size was determined based on Morgan table (n=150). For analyzing food security level, the 18-item USDA househo...

The most important requirement of the family after food and clothing is housing. It also plays an important role in providing safety and security etc. for the family. Security is important therefore it is placed among other human physiological needs like food, shelter and sanitation. Security feeling is one of the main factorsin stability of urban spaces. It can be said that secure enviro...

Background: Achievement of food security has become one of the major challenges of most developing countries, including Zimbabwe. This study was designed to investigate the effect of agricultural commercialization on household food security. Methods: This study used cross-sectional data for the 2017/18 farming season collected from 165 smallholder farmer households in Zhombe north rural distric...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید