نتایج جستجو برای: security order
تعداد نتایج: 1066303 فیلتر نتایج به سال:
The study highlights the importance to develop the national economy through assuring energy security. The study aims to analyze how to develop renewable energy sources, determine the main priorities of Ukraine’s national security policy and discover novel ways of assuring energy security due to developing the industry of renewable energy in the light of environmental safety, energy conservation...
Popular upheavals and regional developments in the Islamic world began in 2011, which began with the uprising of the Tunisian people, and then spread to other countries in the Arab world, including Egypt, Bahrain and Yemen. Major changes in the periphery of Iran were considered. Which affects the national security of the various countries of the region, including Iran. This paper, by descripti...
<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: -webkit-left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; ba...
china is a vast and overpopulated country in the eastern asia whose energy security and supply is the most important factor of economic growth and consequently, economic, social and political security. by the past decades, its leaders have understood the key role of economic growth and development in the economic and political security of china. thus, they have put all their concentration on th...
Security is a critical concern for any information system. Security properties such as confidentiality, integrity and availability need to be enforced in order to make systems safe. In complex environments, where information systems are composed of a number of heterogeneous subsystems, each must participate in their achievement. Therefore, security integration mechanisms are needed in order to ...
Smart spaces – like smart homes, smart offices and smart cities – exploit variousresources in order to offer enriched services and information for the end users.Achieving security in such a dynamic and heterogeneous environment with pre-defined and static security mechanisms is a challenging task. Hence, solutions forself-adaptive security are needed. Self-adaptive security is a...
Security policies are widely used across the IT industry in order to secure environments. Firewalls, routers, enterprise application or even operating systems like Windows and Unix are all using security policies to some extent in order to secure certain components. In order to automate enforcement of security policies, security policy languages have been introduced. Security policy languages t...
considering the importance of agriculture sector for production, employment and establishing food security, different countries include developed and developing ones, support mentioned sectors in various ways. present study investigates the effects on government support policies on iran's food security using vecm and time series data of 1990-2010. results revealed that government support p...
We are developing an approach using Jackson's Problem Frames to analyse security problems in order to determine security vulnerabilities. We introduce the notion of an anti-requirement as the requirement of a malicious user that can subvert an existing requirement. We incorporate anti-requirements into so-called abuse frames to represent the notion of a security threat imposed by malicious user...
چکیده ندارد.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید