نتایج جستجو برای: security level

تعداد نتایج: 1235388  

Journal: :Journal of the Korea Institute of Information Security and Cryptology 2015

Journal: :journal of artificial intelligence in electrical engineering 2016
shiva alipour ghorbani hossein nasiraghdam

the issue of unit commitment is one of the most important economic plans in power system. in modern and traditional power systems, in addition to being economical of the planning, the issue of security in unit operation is also of great importance. hence power system operation confronts units’ participation and input considering network security constrains. the issue of units’ participation is ...

Journal: :جغرافیا و توسعه ناحیه ای 0
زرقانی زرقانی اعظمی اعظمی

various and complex human activities in geographical contexts need proper ground if at most efficiency is to be achieved. land preparation regulates the relationship between human, space, and human activities. land preparation has various dimensions related to value system, political, scientific, artistic, and defense-security aspects. one of the most important dimensions of land preparation is...

Journal: :international journal of agricultural science, research and technology in extension and education systems 2013
muhammad furqan mirza badar naseem siddiqui muhammad hanif almas jabeen ghazala sadaf

about half of the population in pakistan is food insecure. the study focused the food secure population and the strategies for reducing poverty in district rawalpindi. the study was carried out in district rawalpindi in the punjab province of pakistan. simple random sampling technique was used for this research study in district rawalpindi. a sample of 120 respondents was selected. then the dat...

2002
Sunil Hattangady Chris Davis

Introduction..................................................................... Security Strata................................................................. Low-Level Security Needs.......................................... Mid-Level Security Needs .......................................... High-Level Security Needs......................................... A Security Platform................

Journal: :JNW 2008
Stefan Lindskog Zoltán Faigl Anna Brunstrom

Security is an increasingly important issue for networked services. However, since networked environments may exhibit varying networking behavior and contain heterogeneous devices with varying resources tunable security services are needed. A tunable security service is a service that provides different security configurations that are selected, and possibly altered, at run-time. In this paper,...

Journal: :Inf. Manag. Comput. Security 2010
Rodrigo Werlinger Kasia Muldner Kirstie Hawkey Konstantin Beznosov

Purpose – The purpose of this paper is to examine security incident response practices of information technology (IT) security practitioners as a diagnostic work process, including the preparation phase, detection, and analysis of anomalies. Design/methodology/approach – The data set consisted of 16 semi-structured interviews with IT security practitioners from seven organizational types (e.g. ...

2017
Erkuden Rios Massimiliano Rak Eider Iturbe Wissam Mallouli

Multi-cloud applications, i.e. those that are deployed over multiple independent Cloud providers, pose a number of challenges to the security-aware development and operation. Security assurance in such applications is hard due to the lack of insights of security controls applied by Cloud providers and the need of controlling the security levels of all the components and layers at a time. This p...

2010
Trajce Dimkov Wolter Pieters Pieter H. Hartel

The security goals of an organization are realized through security policies, which concern physical security, digital security and security awareness. An insider is aware of these security policies, and might be able to thwart the security goals by combining physical, digital and social means. A systematic analysis of such attacks requires the whole environment where the insider operates to be...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید