Results 41 to 50 of about 2,405,806 (209)

Vulnerability Analysis of CSP Based on Stochastic Game Theory

open access: yesJournal of Control Science and Engineering, 2016
With the development of industrial informatization, the industrial control network has gradually become much accessible for attackers. A series of vulnerabilities will therefore be exposed, especially the vulnerability of exclusive industrial ...
Jiajun Shen, Dongqin Feng
doaj   +1 more source

An integrated modeling, verification, and code generation for uncrewed aerial systems: less cost and more efficiency [PDF]

open access: yesPeerJ Computer Science
Uncrewed Aerial Systems (UASs) are widely implemented in safety-critical fields such as industrial production, military operations, and disaster relief.
Jianyu Zhang   +4 more
doaj   +2 more sources

Comparison of the Efficiency of Budget Financing and the Social Security of a Region [PDF]

open access: yes, 2016
The article deals with theoretical and economic aspects of the “security” category and draws a distinction between philosophical, sociological, and economic approaches to the concept of social security.
Kuklin, A. A.   +2 more
core   +2 more sources

The NPFIT strategy for information security of care record service [PDF]

open access: yes, 2011
The National Programme for IT in England doesn’t have a one-document strategy for its information security of the Care Records Service, which is the national EHR system.
Mohammad, Y, Stergioulas, L
core  

INSTITUTIONAL STRATEGIES OF SYSTEM SECURITY OF TECHNOLOGICAL & INNOVATION SYSTEMS

open access: yesBaltic Journal of Economic Studies, 2019
The purpose of this study is to consider the main aspects of system security providing institutional concept within the technological & innovation systems research methodology development through institutional innovations. In this paper, we will consider
Vitaliy Omelyanenko
doaj   +1 more source

Xi Jinping’s “The Great Rejuvenation of the Chinese Nation - Chinese Dream” as an Ideological Basis for the National Security of China

open access: yesRUDN Journal of Political Science, 2023
The turn of Russia’s foreign policy vector to the East stimulates the better understanding of political processes and phenomena in China, which have not yet been sufficiently considered in Russian academia and political elites. Unlike the lack of a clear
Leonid G. Abdrakhimov
doaj   +1 more source

Poland’s defense preparations in the context of allied obligations. Legal, institutional, and instrumental aspects [PDF]

open access: yesScientific Journal of the Military University of Land Forces, 2020
Poland’s accession to the North Atlantic Treaty Organization in 1999 was one of the most critical events in the Third Republic history. The integration process with NATO’s political and military structures is long-term and requires the constant ...
Marian Kuliczkowski
doaj   +1 more source

Under the Radar: Muslims Deported, Detained, and Denied on Unsubstantiated Terrorism Allegations [PDF]

open access: yes, 2011
Through the targeted use of a wide set of immigration and law enforcement policies and actions, the U.S. government has cast Muslims as dangerous threats to national security, leaving Muslim communities across the United States vulnerable to ...
Amna Akbar   +4 more
core  

Research on Digital Forensics Analyzing Heterogeneous Internet of Things Incident Investigations

open access: yesApplied Sciences
In the landscape of the Fourth Industrial Revolution, the integration of the Internet of Things (IoT) in smart-home technology presents intricate challenges for digital forensics.
Dong-Hyuk Shin   +3 more
doaj   +1 more source

THE NATIONAL SECURITY SYSTEM

open access: yesKnowledge International Journal, 2018
The rapid development of science and technology has led to the emergence of a crisis in society. Science "pushes" religion, but does not offer a new moral code in its place. The definitions of "security" are almost as many and as controversial as postmodernism.
openaire   +1 more source

Home - About - Disclaimer - Privacy