نتایج جستجو برای: security concern

تعداد نتایج: 277671  

2000
John Viega David Evans

Writing secure code is something most developers know little about. As a result, software vulnerabilities are quite common. We postulate that, by isolating security as a separate concern, this problem can be al-

ژورنال: پزشکی قانونی 2021

the development of new technology and modern equipment has led to the development of telemedicine systems. As a result, there are dangers such as publishing patient information and intentionally or unintentionally, medical information. The forensic organization, as one of the powerful arms of the judiciary, pursues important cases in the medical and psychiatric commissions to take steps to rea...

2015
Bart Elias

Cybersecurity is a growing concern for civil aviation, although the significance of reports in May that a computer security researcher hacked into aircraft control systems while flying as a passenger aboard commercial jets is still unclear. The probe into the alleged hacking incidents unfolded just weeks after the Federal Bureau of Investigation (FBI) and the Transportation Security Administrat...

2017

Over the past decade, information security has been one of the most sensitive areas of concern discussed at the senior management level for a majority of the world s leading organizations across all industries. In today s globally interconnected economy, with increasing reliance on technology to achieve competitive advantage amongst other objectives, information security is and has been by far ...

2017
Arjita Singh Sengar Pankaj Soni Zubair Md. Fadlullah Hiroki Nishiyama Mostafa M. Fouda S. Kurosawa H. Nakayama N. Kato A. Jamalipour Z. M. Fadlullah T. Taleb A. Vasilakos

Security is a major concern in wireless technology and this work deals with security in wireless mobile ad-hoc network by using Novel IDS in Open Shortest Path First (OSPF) routing protocol. We are bounding wireless mobile ad-hoc network nodes to getting updates from unknown or unwanted nodes on the same network through routing table; we are using a Novel intrusion detection technique with the ...

2004
Paul Thompson

This paper describes research on cognitive and semantic attacks on computer systems and their users. Several countermeasures against such attacks are described, including a description of a prototype News Verifier system. It is argued that because misinformation and deception play a much more significant role in intelligence and security informatics than in other informatics disciplines such as...

2015

Over the past decade, information security has been one of the most sensitive areas of concern discussed at the senior management level for a majority of the world s leading organizations across all industries. In today s globally interconnected economy, with increasing reliance on technology to achieve competitive advantage amongst other objectives, information security is and has been by far ...

2017

Over the past decade, information security has been one of the most sensitive areas of concern discussed at the senior management level for a majority of the world s leading organizations across all industries. In today s globally interconnected economy, with increasing reliance on technology to achieve competitive advantage amongst other objectives, information security is and has been by far ...

2017

Over the past decade, information security has been one of the most sensitive areas of concern discussed at the senior management level for a majority of the world s leading organizations across all industries. In today s globally interconnected economy, with increasing reliance on technology to achieve competitive advantage amongst other objectives, information security is and has been by far ...

2010
Paul Leger Éric Tanter

Real-world applications have to deal with issues related to security, as well as errors and crosscutting concerns. Different trace-based mechanisms with distinctive features have been proposed to solve these particular issues. For example, PQL matches sequence of unordered events, and tracematches match traces expressed with regular expressions. Despite that applications present these issues at...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید