نتایج جستجو برای: critical security studies

تعداد نتایج: 1986502  

Journal: :journal of ai and data mining 2015
h. motameni

to evaluate and predict component-based software security, a two-dimensional model of software security is proposed by stochastic petri net in this paper. in this approach, the software security is modeled by graphical presentation ability of petri nets, and the quantitative prediction is provided by the evaluation capability of stochastic petri net and the computing power of markov chain. each...

Mojtaba Maghsoodi Mostafa Entezari Heravi

Understanding the policy cycle, as well as scrutinizing the text of hidden and obvious policies and rules, requires a model of discourse analysis based on which discursive ap-proaches of policy makers are understood and estimated. However, when it comes to presenting a policy model, we have to use the views of policy theorists to see how a problem as a "public goods" can be found in the policy ...

2015
Qin Yang Yanwu Wang

Customer loyalty or repeat purchasing is critical for the survival and success of any store. By focusing on online stores, this study investigates the repeat purchase intention of experienced online buyers based on means-end chain theory and prospect theory. Buyer concern about website security is a critical issue when it comes to maximizing the potential for electronic commerce transactions. B...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1388

since the 1960s the age effects on learning both first and second language have been explored by many linguists and applied linguists (e.g lennerberg, 1967; schachter, 1996; long, 1990) and the existence of critical period for language acquisition was found to be a common ground of all these studies. in spite of some common findings, some issues about the impacts of age on acquiring a second or...

2017
Giovanni Bottazzi Giuseppe F. Italiano Giuseppe Giulio Rutigliano

The information security management is a widely discussed topic in recent years, due to the increasing number of attacks and the growth of the damage they can cause to the daily life of a society. In this context, new emerging paradigms, such as IoT, the CPS and Critical Infrastructure, converge towards common technologies, resulting in a dangerous interconnection and interdependence of worlds ...

2013
Ulya Sabeel Saima Maqbool Nidhi Chandra

Sensor networks have been regarded as one of the emerging technologies of the 21 century and have great future scope. They have been widely used in mission critical applications like military, health as well as civilian applications. The focus of this paper is on a security of sensor networks in various fields. Security is the major concern of a wireless sensor network especially in unattended ...

2003
Margaret Anne McGaley

This project was motivated by the growing apprehension among Irish citizens over the electronic voting system being introduced here. The aims of the project were three: to discover what would be required of an electronic voting system to make it a suitable replacement for the existing paper-ballot system; to examine whether the Nedap/Powervote system meets those requirements; to begin the proce...

2014
K. C. Okafor C. M. Nwafor C. C. Udeze F. N. Ugwoke

Studies have shown that some existing enterprise applications including bussiness ERPs, Social Networks, etc implements a single layer security scheme which can easily be hacked. Also, these applications suffer from multiple security vulnerabilities, including SQL Injection Attacks (SQLIA), Social engineering, spoofing, etc. For most mission critical enterprises, their organizational critical a...

2015
Mara Cole

Mobility, particularly air transport, is vital to the economic stability and growth of a nation. It symbolizes national self-confidence and selfconception. As a result commercial aviation remains a preferred target for attacks by terrorists and other offenders. Security measures intended to render these threats harmless have mostly been introduced in response to specific occurrences, thus allow...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید