Results 151 to 160 of about 1,942,206 (195)
Some of the next articles are maybe not open access.

Information System Security: Government Information Security Reform Act Implementation: Defense Security Assistance Management System

2002
Abstract : To gather data on assessments of the effectiveness of DoD information assurance policies, procedures, and practices, DoD developed a GISR Act collection matrix for automated information systems. DoD selected a sample of 560 automated information systems from the almost 4,000 automated information systems in DoD.
Walter S. Bohinski   +4 more
openaire   +1 more source

Information Security Management Systems Cybernetics

2012
With the widespread dissemination of Information Technology in enterprises and households in the mid-90s, discussions began on how to manage it. Meanwhile, in the area of enterprise security management systems worldwide, enforced use of the Deming cycle initially worked against the implementation of policies.
openaire   +1 more source

The rumen microbiome: balancing food security and environmental impacts

Nature Reviews Microbiology, 2021
Itzhak Mizrahi   +2 more
exaly  

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges

IEEE Communications Surveys and Tutorials, 2021
Van-Linh Nguyen   +2 more
exaly  

Climate change impacts on plant pathogens, food security and paths forward

Nature Reviews Microbiology, 2023
Brajesh K Singh   +2 more
exaly  

A Survey on Space-Air-Ground-Sea Integrated Network Security in 6G

IEEE Communications Surveys and Tutorials, 2022
Hongzhi Guo, Jingyi Li, Jiajia Liu
exaly  

A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions

IEEE Communications Surveys and Tutorials, 2020
Rabia Khan   +2 more
exaly  

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security

IEEE Communications Surveys and Tutorials, 2020
Amr Mohamed   +2 more
exaly  

Home - About - Disclaimer - Privacy