Buscar
Mostrando ítems 31-40 de 6628
A Flexible Architecture for Privacy-Aware Trust Management
(Universidad de Talca, 2010)
Vulnerability and adaptive capacity of community food systems in the Peruvian Amazon: a case study from Panaillo
(Springer, 2015)
Rainfall variability and related hydrological disasters are serious threats to agricultural production in developing countries. Since projections of climate change indicate an increase in the frequency and intensity of ...
Impact of Wireless Energy Transfer Strategies on the Secrecy Performance of Untrustworthy Relay Networks
(2022-01-01)
This work investigates the secrecy outage performance of a dual-hop relaying network with an untrustworthy energy-constrained amplify-and-forward relay. A destination-based jamming technique is adopted in order to prevent ...
Segurança da informação: uma proposta para projeto de rede baseada em software livre
(Universidade Tecnológica Federal do ParanáCuritibaDepartamento Acadêmico de Eletrônica, 2013-12-12)
There´s no turning back, any organization, since a small company with two or three PCs to a complex organization with a acting in different countries, it know that in greater or lesser extend the technology is essential ...
Um sistema para gestão do conhecimento em ameaças, vulnerabilidades e seus efeitos
(Universidade Federal do Rio Grande do NorteBRUFRNPrograma de Pós-Graduação em Engenharia ElétricaAutomação e Sistemas; Engenharia de Computação; Telecomunicações, 2005-12-20)
Attacks to devices connected to networks are one of the main problems related to the confidentiality of sensitive data and the correct functioning of computer systems. In spite of the availability of tools and procedures ...