Results 1 to 10 of about 243,869 (146)

Basics and security system in the national security strategy [PDF]

open access: yesВојно дело, 2017
The term 'security' has changed its meaning throughout history. Nowadays there are many definitions of this term, which depend on the context in which it is used.
Đukić Stanimir
doaj   +2 more sources

SOCIAL SECURITY AS PART OF THE NATIONAL SECURITY SYSTEM OF BULGARIA

open access: yesSecurity and Defence Quarterly, 2017
Social security and social entrepreneurship are subject to special attention from the European Commission (EC), particularly in recent years. This is due to their potential to find solutions to society’s problems related to the creation of sustainable ...
Nikolay NICHEV
doaj   +2 more sources

Construction of Strategic Early-Warning System in Cyberspace

open access: yes中国工程科学, 2021
Cyberspace strategic early-warning is a monitoring and warning system that is established by a country or group for early detection, tracking, identification, and notification of incoming major cyber attacks or the spreading destruction of powerful ...
Zhuang Honglin   +5 more
doaj   +1 more source

A Survey on Bug Deduplication and Triage Methods from Multiple Points of View

open access: yesApplied Sciences, 2023
To address the issue of insufficient testing caused by the continuous reduction of software development cycles, many organizations maintain bug repositories and bug tracking systems to ensure real-time updates of bugs.
Cheng Qian   +4 more
doaj   +1 more source

Fooling Examples: Another Intriguing Property of Neural Networks

open access: yesSensors, 2023
Neural networks have been proven to be vulnerable to adversarial examples; these are examples that can be recognized by both humans and neural networks, although neural networks give incorrect predictions.
Ming Zhang, Yongkang Chen, Cheng Qian
doaj   +1 more source

Environmental security in the national security system

open access: yesIOP Conference Series: Earth and Environmental Science, 2021
Abstract The security of any society depends directly on the solution of environmental problems and first of all on environmental security. It penetrates all the spheres of modern society, such as economics, industry, agriculture, service sector and so on.
N V Morgacheva, O V Levashova
openaire   +1 more source

Vulnerability Exploitation Risk Assessment Based on Offensive Security Approach

open access: yesApplied Sciences, 2023
Security incidents targeting control systems and the industrial internet of things (IIoT) are on the rise as attackers gain a better understanding of the nature of these systems and their increasing connectivity to information technology (IT). Every year,
Seong-Su Yoon   +3 more
doaj   +1 more source

Delegation-Based Personal Data Processing Request Notarization Framework for GDPR Based on Private Blockchain

open access: yesApplied Sciences, 2021
With the growing awareness regarding the importance of personal data protection, many countries have established laws and regulations to ensure data privacy and are supervising managements to comply with them.
Sung-Soo Jung   +2 more
doaj   +1 more source

Vulnerabilities of the Open Platform Communication Unified Architecture Protocol in Industrial Internet of Things Operation

open access: yesSensors, 2022
Recently, as new threats from attackers are discovered, the damage and scale of these threats are increasing. Vulnerabilities should be identified early, and countermeasures should be implemented to solve this problem.
Dong-Hyuk Shin   +2 more
doaj   +1 more source

Citing National Security Exceptions in the System of International Treaties [PDF]

open access: yesFaṣlnāmah-i Pizhūhish-i Huqūq-i ̒Umūmī, 2022
The states whose national security is threatened sometimes violate international law by seeking to maintain their national security. Thus, the treaty system took national security into account.
Abbasali Kadkhodaei, Seyed reza Jalili
doaj   +1 more source

Home - About - Disclaimer - Privacy