نتایج جستجو برای: threats
تعداد نتایج: 31573 فیلتر نتایج به سال:
Detecting and responding to security and privacy threats on Radio Frequency IDentification (RFID) technologies are becoming one of the major concerns of information security researchers. However, and before going further in these activities, an evaluation of threats in terms of importance must be done. We present in this paper an evaluation of threats on Electronic Product Code (EPC) based RFID...
This document provides some analysis of threats against the Geopriv protocol architecture. It focuses on protocol threats, threats that result from the storage of data by entities in the architecture, and threats posed by the abuse of information yielded by Geopriv. Some security properties that meet these threats are enumerated as a reference for Geopriv requirements. Danley, et al. Informatio...
Mucormycosis is an opportunistic fungal infection due to organisms of the Zygomycetes class and order Mucorales that can cause various types infections. In recent years, increasing phenomenon has been observed—invasive infections especially in healthcare setting. Among immucompromised patients, important clinical emergency could be represented by mucormycosis. The epidemiology mucormycosis show...
The rapid evolution of information, communication and entertainment technologies will transform the lives of citizens and ultimately transform society. This paper focuses on ethical issues associated with the likely convergence of virtual realities (VR) and social networks (SNs), hereafter VRSNs. We examine a scenario in which a significant segment of the world's population has a presence in a ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید