Results 231 to 240 of about 365,185 (272)
Some of the next articles are maybe not open access.

A comprehensive security control selection model for inter-dependent organizational assets structure

Information and Computer Security, 2015
Purpose – This paper aims to propose a comprehensive model to find out the most preventive subset of security controls against potential security attacks inside the limited budget.
M. Shahpasand   +3 more
semanticscholar   +1 more source

A Security Analysis of CNC Machines in Industry 4.0

International Conference on Detection of intrusions and malware, and vulnerability assessment, 2023
Marco Balduzzi   +3 more
semanticscholar   +1 more source

Cyber security: challenges for society- literature review

, 2013
Cyber security is the activity of protecting information and information systems (networks, computers, data bases, data centres and applications) with appropriate procedural and technological security measures.
Atul M. Tonge   +2 more
semanticscholar   +1 more source

A Reference Architecture for Activities-as-Asset Distributed Ledger with Secure Private Computation

2023 International Conference on Information Networking (ICOIN), 2023
Chen-Fu Chiang   +5 more
openaire   +1 more source

Secure Multi-Party Computation for Digital Assets Custody Purpose - Analysis of Open-Source Implementations

2023 Fifth International Conference on Blockchain Computing and Applications (BCCA), 2023
Daniel Roszak, Zakwan Jaroucheh
openaire   +1 more source

Modelling the interplay of security, privacy and trust in sociotechnical systems: a computer-aided design approach

Journal of Software and Systems Modeling, 2019
Mattia Salnitri   +5 more
semanticscholar   +1 more source

Information security risk management planning: A case study at application module of state asset directorate general of state asset ministry of finance

International Conference on Advanced Computer Science and Information System, 2014
S. Prasetyo, Y. G. Sucahyo
semanticscholar   +1 more source

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges

IEEE Communications Surveys and Tutorials, 2021
Bo-chao Cheng   +2 more
exaly  

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security

IEEE Communications Surveys and Tutorials, 2020
Abdulla Al-ali, Amr Mohamed, Ihsan Ali
exaly  

Home - About - Disclaimer - Privacy