نتایج جستجو برای: data threats

تعداد نتایج: 2432735  

Journal: :International Journal of Electrical and Computer Engineering (IJECE) 2015

Journal: :Future Generation Computer Systems 2023

With the proliferation of smart devices and revolutions in communications, electrical distribution systems are gradually shifting from passive, manually-operated inflexible ones, to a massively interconnected cyber–physical grid address energy challenges future. However, integration several cutting-edge technologies has introduced many security privacy vulnerabilities due large-scale complexity...

Journal: :J. Information Security 2012
Ahmad Bakhtiyari Shahri Zuraini Ismail

Security remains to be a critical issue in the safe operation of Information Systems (IS). Identifying the threats to IS may lead to an effective method for measuring security as the initial stage for risk management. Despite many attempts to classify threats to IS, new threats to Health Information Systems (HIS) remains a continual concern for system developers. The main aim of this paper is t...

اسماعیلی ساری, عباس, رضایی, حمیدرضا, میرزایی, روح‌اله, همامی, محمودرضا,

Mapping spatial patterns of potential biodiversity threats is one of the important steps for effective conservation planning and activities. To determine the spatial patterns of threats in Golestan province, 12 criteria in four main groups including structural (fractal coefficient of perimeter, circularity ratio of area, average slope), compositional aspects of biodiversity (presence of species...

ژورنال: Hormozgan Medical Journal 2011
Keikavoosi Arani, L, Nasiripour, A.A, Raeissi, P, Tabibi, S.J,

Introduction: Medical errors represent a serious public health problem and pose a threat to patient safety. This study aimed to determine the hidden threats in the incidence of medical errors at public hospitals in Tehran. Methods: In this descriptive study, the population included all process owners (12-person teams) in public hospitals of Tehran. The sample size was 396 individuals, sel...

Journal: :journal of rangeland science 2014
abolfazl sharifiyan bahraman hossein barani ahmad abedi sarvestani abolfazl haji mollahoseini

rangelands are known as one of the main income resources for their exploiters.in the recent century, management of iran rangeland has undergone vast transformationsbecause of vulnerable socio-economic conditions of pastoralists. a study was done toprovide a clear picture of the status and utilization of aq qala rangelands via assessinginternal and external environmental factors affecting the ut...

Journal: :Security and Communication Networks 2012
Ilsun You Gabriele Lenzini Marek R. Ogiela Elisa Bertino

In the last decade, computer science researchers have been working hard to prevent attacks against the security of information systems. Different adversary models have incarnated the malicious entities against which researchers have defined security properties, identified security vulnerabilities, and engineered security defenses. These adversaries were usually intruders, that is, outsiders try...

Journal: :JoWUA 2012
Yoshiaki Hori William R. Claycomb Kangbin Yim

Organizations continue to be plagued by information leaks caused by insiders with legitimate access to critical or proprietary information. Such unauthorized leaks may result in significant damage to competitiveness, reputation and finances, and organizations should consider proactive approaches to preventing, detecting, and responding to this threat. In this special issue, we have selected eig...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید