این سایت در حال حاضر پشتیبانی نمی شود و امکان دارد داده های نشریات بروز نباشند
صفحه اصلی
درباره پایگاه
فهرست سامانه ها
الزامات سامانه ها
فهرست سازمانی
تماس با ما
JCR 2016
جستجوی مقالات
یکشنبه 23 آذر 1404
International Journal of Nonlinear Analysis and Applications
، جلد ۱۲، شماره Special Issue، صفحات ۴۱۵-۴۲۴
عنوان فارسی
چکیده فارسی مقاله
کلیدواژههای فارسی مقاله
عنوان انگلیسی
A Study and analysis of attacks by exploiting the source code against computer systems
چکیده انگلیسی مقاله
An avalanche of threats from malicious used information and communication technologies (ICT) in political, military, economic and social affairs led to a deep awareness of the fact that new technologies may pose additional risks to international peace and safety. Thus, the problem of international information security, that is, the state of the spread of information among the countries of the world, with which excludes the possibility of violation of the rights of the individual and users in various state agencies and in all fields of knowledge. In the field of knowledge, as well as destructive and illegal impact on elements of the national critical information infrastructure, became an integral part of international security as a system of international relations based on the observance by all states of generally recognized principles and norms of international law and excluding the solution of controversial questions and disagreements between them through force or threat of force, in general. Thus, the principles of international security providing for promoting peaceful coexistence, being ensuring equal security for all states, the creation of effective guarantees in the military, political, economic and humanitarian spheres, preventing the race of nuclear and space weapons, respect for the sovereign rights of every people, fair political settlement of international crises and regional conflicts certainly include the creation of a system of international information security. At the same time, under the IIB system, designed for countering threats to strategic stability and ensuring equal partnership in the global digital environment, we understand the totality international and national norms and institutions, chief among which are the UN Regulated activities of various actors worldwide.
کلیدواژههای انگلیسی مقاله
Source Code, DNS Spoofing, DoS (Denial of Service)
نویسندگان مقاله
Ahmed Badrulddin |
Department of Law Affairs, Baghdad University Presidency, University of Baghdad, Iraq
نشانی اینترنتی
https://ijnaa.semnan.ac.ir/article_5279_4b934e43f95aa7abaad00a8d30b56bb3.pdf
فایل مقاله
فایلی برای مقاله ذخیره نشده است
کد مقاله (doi)
زبان مقاله منتشر شده
en
موضوعات مقاله منتشر شده
نوع مقاله منتشر شده
برگشت به:
صفحه اول پایگاه
|
نسخه مرتبط
|
نشریه مرتبط
|
فهرست نشریات