Results 21 to 30 of about 2,405,806 (209)

Formal Analysis of QUIC Handshake Protocol Using Symbolic Model Checking

open access: yesIEEE Access, 2021
This work presents a security analysis of the QUIC handshake protocol based on symbolic model checking. As a newly proposed secure transport protocol, the purpose of QUIC is to improve the transport performance of HTTPS traffic and enable rapid ...
Jingjing Zhang   +5 more
doaj   +1 more source

Strategic deterrence: The key competences of the state bodies of the Republic of Serbia [PDF]

open access: yesВојно дело, 2022
In the post-Cold War period, contemporary studies of strategic deterrence have expanded from traditional ones to contents that are much broader in terms of content and topics.
Blagojević Veljko, Radanović Tihomir
doaj   +1 more source

Research on non-standard industrial control protocol formats reverse

open access: yesDianzi Jishu Yingyong, 2018
Correct non-standard protocol format recognition is the foundation of protocol security analysis, which is an important part of industrial control system(ICS) information security content.
Cheng Bicheng   +3 more
doaj   +1 more source

RESEARCH FRAMEWORK FOR SYSTEM SECURITY OF TECHNOLOGICAL & INNOVATION SYSTEMS [PDF]

open access: yesBaltic Journal of Economic Studies, 2018
The purpose of this study is to consider the main aspects of system security theoretical concept and practical aspect within the technological & innovation systems research methodology development according to their considering as structurally ...
Olha Kudrina, Vitaliy Omelyanenko
doaj   +1 more source

Security component of states’ stability on a national and international level [PDF]

open access: yesMeđunarodni Problemi, 2022
The paper analyses the issue of political stability in the context of changes in the positions of major political actors. The altered role of the nation-state in the conditions of globalisation inevitably reflects on the understanding of the security ...
Žarko Obradović, Miroslav Mladenović
doaj   +1 more source

OVERLOAD AND TRAFFIC MANAGEMENT OF MESSAGE SOURCES WITH DIFFERENT PRIORITY OF SERVICE

open access: yesInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, 2023
The scheme of dynamic management of traffic and activity of message sources with different priority of service is considered. The scheme is built on the basis of the neuroprognostic analysis model and the gradient descent method.
Valerii Kozlovskyi   +4 more
doaj   +1 more source

Quantifying Privacy Risks for Continuous Trait Data

open access: yesApplied Sciences, 2022
In the context of life sciences, the rapid biotechnical development leads to the creation of huge amounts of biological data. The use of such data naturally brings concerns on human genetic privacy breaches, which also discourage biological data sharing.
Muqing He   +5 more
doaj   +1 more source

Cyberdomains in Ukrainian National Security System

open access: yesÈlektronnoe modelirovanie, 2023
The identification of cyber domains is of significant importance for national cybersecurity as it ensures the protection of critical infrastructure, enhances the effectiveness of cyber threat intel-ligence processes, improves situational awareness, promotes cooperation in the field of cyber-security, information exchange, efficient response to cyber ...
A.V. Davydiuk, Yu.Ye. Khokhlacheva
openaire   +1 more source

Reviving egalitarianism in the Global Transformation: Building occupational security [PDF]

open access: yes, 2008
The world is in the midst of a Global Transformation, reflecting the painful creation of a global market society. Globalization was the disembedded phase, in which inequalities and insecurities multiplied as national systems of regulation, social ...
Standing, Guy
core   +1 more source

Information Security in the National Security System in the Modem Age

open access: yesFiat Justisia, 2022
This article provides a legal analysis of information security as a critical regulatory institution in the contemporary digital age. The relevance of this study lies in the recognition that information and its sources, along with their protective ...
Hussein Vakhaevich Idrisov
doaj   +1 more source

Home - About - Disclaimer - Privacy