Detecting Critical Nodes of Marine Region Network Using K-core Method

2020 ◽  
Vol 104 (sp1) ◽  
Author(s):  
Lili Wang ◽  
Wenwen Xiao
Keyword(s):  
2008 ◽  
Vol 19 (9) ◽  
pp. 2376-2388 ◽  
Author(s):  
Zhen-Hua LI ◽  
Gui-Hai CHEN ◽  
Tong-Qing QIU

Author(s):  
Brad E. Kelle ◽  
Brent A. Strawn

This brief chapter introduces the Oxford Handbook of the Historical Books of the Hebrew Bible. It notes the secondary and constructed nature of the category “Historical Books” (which is not native to the Hebrew Bible) and how this category might be potentially misleading as to the content and genre of these books, many of which are devoid of historiographic intent in anything like the modern sense. With these caveats entered, the introduction next explains how the essays in the book touch on four critical nodes: context (sources, history, texts), content (themes, concepts, issues), approaches (composition, synthesis, theory), and reception (literature, traditions, figures). Further, each essayist was asked to speak to how the topic/area/issue addressed in the essay relates to the Historical Books, as well as how the topic/area/issue helps one better interpret the Historical Books. In conclusion, this introduction notes the diversity that marks recent research in these books.


Author(s):  
Andrei V. Gavrilenko ◽  

The article considers an issue of information security of the distance education systems. It analyzes the functions and architecture of the typical distance education system. With considering the requirements of information security it also discusses the university information system for solving the distance learning problems. The author defines valuable assets and information resources and describes the existing security threats. The subjects of interaction in the distance learning mode are presented. There is a consideration of the principal directions of the university’s activity in the distance learning system, requiring constant monitoring of information security. A threat model is worked out and the main security vulnerabilities are highlighted. The analysis of the causes and consequences of information security violation in the distance learning system is carried out and most vulnerable and critical nodes were identified. The hardware and software requirements for the remote mode work are regarded. A recommended list of hardware and software tools that ensure compliance with safety requirements is presented. The major lines of protection for distance learning systems are highlighted. The article proves the necessity of conducting a regular security assessment as a means for monitoring an effectiveness of the protection system.


Sign in / Sign up

Export Citation Format

Share Document