Green Card Soldier: Between Model Immigrant and Security Threat

被引:0
|
作者
Lutz, Amy [1 ]
机构
[1] Syracuse Univ, Syracuse, NY 13244 USA
关键词
D O I
10.1086/730978
中图分类号
C91 [社会学];
学科分类号
030301 ; 1204 ;
摘要
引用
收藏
页码:775 / 777
页数:3
相关论文
共 50 条
  • [41] A Verifiable Conformance Relationship between Smart Card Applets and B Security Models
    Dadeatu, Frederic
    Lamboley, Julien
    Moutet, Thierry
    Potet, Marie-Laure
    ABSTRACT STATE MACHINES, B AND Z, PROCEEDINGS, 2008, 5238 : 237 - +
  • [42] A Security Threat Analysis and Evaluation Model for Power Field Operation Terminal
    Li, Nige
    Xu, Min
    Chen, Mu
    Chen, Lu
    2017 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA 2017), 2017, : 382 - 385
  • [43] A Threat Model-Driven Security Testing Approach for Web Application
    Yan, Bobo
    Li, Xiaohong
    Du, Zhijie
    CONTEMPORARY RESEARCH ON E-BUSINESS TECHNOLOGY AND STRATEGY, 2012, 332 : 158 - 168
  • [44] IoT Security in Industry: A Threat Model of Existing and Future Network Infrastructure
    McNett, Jackie
    McNett, Josh
    Su, Xiaoli
    JOURNAL OF APPLIED SECURITY RESEARCH, 2024, 19 (01) : 1 - 19
  • [45] A Threat Model and Security Recommendations for IoT Sensors in Connected Vehicle Networks
    Kuri, Sajib Kumar
    Islam, Tarim
    Jaskolka, Jason
    Ibnkahla, Mohamed
    2022 IEEE 95TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-SPRING), 2022,
  • [46] Persistent information security - Beyond the e-commerce threat model
    Matson, Merv
    Ulieru, Mihaela
    2006 ICEC: Eighth International Conference on Electronic Commerce, Proceedings: THE NEW E-COMMERCE: INNOVATIONS FOR CONQUERING CURRENT BARRIERS, OBSTACLES AND LIMITATIONS TO CONDUCTING SUCCESSFUL BUSINESS ON THE INTERNET, 2006, : 271 - 277
  • [47] TOM: A Threat Operating Model for Early Warning of Cyber Security Threats
    Bo, Tao
    Chen, Yue
    Wang, Can
    Zhao, Yunwei
    Lam, Kwok-Yan
    Chi, Chi-Hung
    Tian, Hui
    ADVANCED DATA MINING AND APPLICATIONS, ADMA 2019, 2019, 11888 : 696 - 711
  • [48] A hierarchical evaluation approach for network security based on threat spread model
    Chen, Feng
    Liu, Dehui
    Zhang, Yi
    Su, Jishu
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2011, 48 (06): : 945 - 954
  • [49] Cyber Security: Threat Detection Model based on Machine learning Algorithm
    Dalal, Kushal Rashmikant
    Rele, Mayur
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES 2018), 2018, : 239 - 243
  • [50] Autonomous Driving Security: A Comprehensive Threat Model of Attacks and Mitigation Strategies
    Hoque, Mohammad Aminul
    Hasan, Ragib
    2022 IEEE 8TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2022,