نتایج جستجو برای: adversary legal system
تعداد نتایج: 2314073 فیلتر نتایج به سال:
abstract when in administrative law the matter of administrative offences are raised, these offences would have legal nature if they are force able, some of these offences are related to administrative law, where as some other pelts are common in civil or penal law. the current research intends not only to consider the concept and foundation of administrative execution rules but also compares...
Security attacks are hard to understand, often expressed with unfriendly and limited details, making it difficult for security experts and for security analysts to create intelligible security specifications. For instance, to explain ”Why” (attack objective), ”What” (i.e., system assets, goals, etc.), and ”How” (attack method), adversary achieved his attack goals. We introduce in this paper a s...
In recent decades, the protection of traditional medicine under the intellectual property system has been the subject of many efforts that was made by international community and especially less developed countries which are rich in this field. Since this knowledge has the unique characteristics and other current legal systems of intellectual property can not protect all aspects of it, the worl...
When studying safety properties of (formal) protocol models, it is customary to view the scheduler as an adversary: an entity trying to falsify the safety property. We show that in the context of security protocols, and in particular of anonymizing protocols, this gives the adversary too much power; for instance, the contents of encrypted messages and internal computations by the parties should...
چکیده ندارد.
In this study, the legal and political challenges and constraints of financial oversight of executives of the country in the proper implementation of the public sector accounting system were studied, identifying the existing obstacles and challenges to improve the supervision to achieve the goals of the sector accounting system. Publicly available. The statistical population of the study is all...
Background: Collecting data in the form of databases is one of the new methods that has been growing with the advancement of information technology. The use of databases in management and policy-making has created challenges in areas such as privacy breaches and compliance with accepted ethical norms. The increasing use of databases in public and private organizations in Iran has introduced new...
Networks of decoy nodes protect cyber systems by distracting and misleading adversaries. Decoy defenses can be further enhanced by randomizing the space of node IP addresses, thus preventing an adversary from identifying and blacklisting decoy nodes over time. The decoy-based defense results in a time-varying interaction between the adversary, who attempts to identify and target real nodes, and...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید