Results 1 to 10 of about 243,869 (146)
Basics and security system in the national security strategy [PDF]
The term 'security' has changed its meaning throughout history. Nowadays there are many definitions of this term, which depend on the context in which it is used.
Đukić Stanimir
doaj +2 more sources
SOCIAL SECURITY AS PART OF THE NATIONAL SECURITY SYSTEM OF BULGARIA
Social security and social entrepreneurship are subject to special attention from the European Commission (EC), particularly in recent years. This is due to their potential to find solutions to society’s problems related to the creation of sustainable ...
Nikolay NICHEV
doaj +2 more sources
Construction of Strategic Early-Warning System in Cyberspace
Cyberspace strategic early-warning is a monitoring and warning system that is established by a country or group for early detection, tracking, identification, and notification of incoming major cyber attacks or the spreading destruction of powerful ...
Zhuang Honglin +5 more
doaj +1 more source
A Survey on Bug Deduplication and Triage Methods from Multiple Points of View
To address the issue of insufficient testing caused by the continuous reduction of software development cycles, many organizations maintain bug repositories and bug tracking systems to ensure real-time updates of bugs.
Cheng Qian +4 more
doaj +1 more source
Fooling Examples: Another Intriguing Property of Neural Networks
Neural networks have been proven to be vulnerable to adversarial examples; these are examples that can be recognized by both humans and neural networks, although neural networks give incorrect predictions.
Ming Zhang, Yongkang Chen, Cheng Qian
doaj +1 more source
Environmental security in the national security system
Abstract The security of any society depends directly on the solution of environmental problems and first of all on environmental security. It penetrates all the spheres of modern society, such as economics, industry, agriculture, service sector and so on.
N V Morgacheva, O V Levashova
openaire +1 more source
Vulnerability Exploitation Risk Assessment Based on Offensive Security Approach
Security incidents targeting control systems and the industrial internet of things (IIoT) are on the rise as attackers gain a better understanding of the nature of these systems and their increasing connectivity to information technology (IT). Every year,
Seong-Su Yoon +3 more
doaj +1 more source
With the growing awareness regarding the importance of personal data protection, many countries have established laws and regulations to ensure data privacy and are supervising managements to comply with them.
Sung-Soo Jung +2 more
doaj +1 more source
Recently, as new threats from attackers are discovered, the damage and scale of these threats are increasing. Vulnerabilities should be identified early, and countermeasures should be implemented to solve this problem.
Dong-Hyuk Shin +2 more
doaj +1 more source
Citing National Security Exceptions in the System of International Treaties [PDF]
The states whose national security is threatened sometimes violate international law by seeking to maintain their national security. Thus, the treaty system took national security into account.
Abbasali Kadkhodaei, Seyed reza Jalili
doaj +1 more source

