نتایج جستجو برای: security analysis

تعداد نتایج: 2963315  

ژورنال: مجله طب نظامی 2020

Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...

Journal: :Journal of Information Security 2010

Journal: :IEICE Transactions on Information and Systems 2008

Journal: :international journal of agricultural science, research and technology in extension and education systems 2012
amsalu mitiku bekabil fufa beyene tadese

this study examined the status and determinants of rural households’ food security in moyale district of pastoral area, oromia regional state, in ethiopia. both secondary and primary data were used for the study. the study was based on the survey of a total of 100 farmers randomly selected using a three-stage sampling technique. analytical tools used include descriptive statistics, foster-greer...

Abolghasem Fatehi Dahaghani Parvin Foroughiyan Seyyed Reza Naqibos Sadat

This paper studies the role of social security in the prevention of social deviances. About 304 of high school girl students in Shoush (South west of Iran) were (systematic) randomly chosen. The research method was survey with questionnaire. The data were analyzed through spss along with Pearson coefficient correlation, Analysis of Variance, multivariable regression and path analysis were used ...

Journal: :پژوهش های معاصر انقلاب اسلامی 0
نبی الله ابراهیمی استادیار گروه روابط بین الملل دانشگاه تربیت مدرس سید مسعود موسوی شفائی استادیار گروه روابط بین الملل دانشگاه تربیت مدرس زینب زبیدی کارشناس ارشد روابط بین الملل دانشگاه تربیت مدرس

the purpose of this research is to examine the effect of the islamic awakening in the arabic countries of the middle east and north africa on israeli ontological security and, it's strategy ofclosure and deviationin the regional level. in other words, after occurrence of the developments, the ontological security and identity of israel faced with what challenges? this research argues that ...

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

Journal: :مطالعات اوراسیای مرکزی 0
سعید وثوقی استادیار گروه روابط بین الملل دانشگاه اصفهان سعیده مرادی فر دانشجوی کارشناسی ارشد روابط بین الملل دانشگاه اصفهان عسگر صفری دانشجوی کارشناسی ارشد روابط بین الملل دانشگاه اصفهان

after collapse of the soviet :union:, south caucasus countries (azerbaijan, armenia, georgia) gained independence. this independence was associated with tensions such as ethnic and territorial disputes. these conflicts contain kharabakh, abkhazia, and south ossetia which have remained unresolved till now. the main question is why these conflicts have remained unresolved and what conditions are ...

احمدوند, علی‌محمد, دلاور, علی, رضایی, علی‌محمد,

This research is intended to consider the Psychometric characteristics of Feeling Security Scale (TFSS) in Tehran. 3103 Tehrani citizens filled in this form. The Scale validity was checked for its content Validity (referees contingency coefficient) and construct validity (Factor analysis). The results of referee’s contingency coefficient showed that all the obtained coefficients were above 92% ...

Journal: :journal of ai and data mining 2015
h. motameni

to evaluate and predict component-based software security, a two-dimensional model of software security is proposed by stochastic petri net in this paper. in this approach, the software security is modeled by graphical presentation ability of petri nets, and the quantitative prediction is provided by the evaluation capability of stochastic petri net and the computing power of markov chain. each...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید