این سایت در حال حاضر پشتیبانی نمی شود و امکان دارد داده های نشریات بروز نباشند
International Journal of Nonlinear Analysis and Applications، جلد ۱۲، شماره Special Issue، صفحات ۴۱۵-۴۲۴

عنوان فارسی
چکیده فارسی مقاله
کلیدواژه‌های فارسی مقاله

عنوان انگلیسی A Study and analysis of attacks by exploiting the source code against computer systems
چکیده انگلیسی مقاله An avalanche of threats from malicious used information and communication technologies (ICT) ‎in political, military, economic and social affairs led to a deep awareness of the fact that new ‎technologies may pose additional risks to international peace and safety. Thus, the problem of ‎international information security, that is, the state of the spread of information among the ‎countries of the world, with which excludes the possibility of violation of the rights of the ‎individual and users in various state agencies and in all fields of knowledge. In the field of ‎knowledge, as well as destructive and illegal impact on elements of the national critical ‎information infrastructure, became an integral part of international security as a system of ‎international relations based on the observance by all states of generally recognized principles and ‎norms of international law and excluding the solution of controversial questions and ‎disagreements between them through force or threat of force, in general. Thus, the principles of ‎international security providing for promoting peaceful coexistence, being ensuring equal security ‎for all states, the creation of effective guarantees in the military, political, economic and ‎humanitarian spheres, preventing the race of nuclear and space weapons, respect for the sovereign ‎rights of every people, fair political settlement of international crises and regional conflicts ‎certainly include the creation of a system of international information security. At the same time, ‎under the IIB system, designed for countering threats to strategic stability and ensuring equal ‎partnership in the global digital environment, we understand the totality international and ‎national norms and institutions, chief among which are the UN Regulated activities of various ‎actors worldwide.‎
کلیدواژه‌های انگلیسی مقاله Source Code, DNS Spoofing, DoS (Denial of Service)‎

نویسندگان مقاله Ahmed Badrulddin |
Department of Law Affairs, Baghdad University Presidency, University of Baghdad, Iraq


نشانی اینترنتی https://ijnaa.semnan.ac.ir/article_5279_4b934e43f95aa7abaad00a8d30b56bb3.pdf
فایل مقاله فایلی برای مقاله ذخیره نشده است
کد مقاله (doi)
زبان مقاله منتشر شده en
موضوعات مقاله منتشر شده
نوع مقاله منتشر شده
برگشت به: صفحه اول پایگاه   |   نسخه مرتبط   |   نشریه مرتبط   |   فهرست نشریات