Vulnerability Analysis of CSP Based on Stochastic Game Theory
With the development of industrial informatization, the industrial control network has gradually become much accessible for attackers. A series of vulnerabilities will therefore be exposed, especially the vulnerability of exclusive industrial ...
Jiajun Shen, Dongqin Feng
doaj +1 more source
An integrated modeling, verification, and code generation for uncrewed aerial systems: less cost and more efficiency [PDF]
Uncrewed Aerial Systems (UASs) are widely implemented in safety-critical fields such as industrial production, military operations, and disaster relief.
Jianyu Zhang +4 more
doaj +2 more sources
Comparison of the Efficiency of Budget Financing and the Social Security of a Region [PDF]
The article deals with theoretical and economic aspects of the “security” category and draws a distinction between philosophical, sociological, and economic approaches to the concept of social security.
Kuklin, A. A. +2 more
core +2 more sources
The NPFIT strategy for information security of care record service [PDF]
The National Programme for IT in England doesn’t have a one-document strategy for its information security of the Care Records Service, which is the national EHR system.
Mohammad, Y, Stergioulas, L
core
INSTITUTIONAL STRATEGIES OF SYSTEM SECURITY OF TECHNOLOGICAL & INNOVATION SYSTEMS
The purpose of this study is to consider the main aspects of system security providing institutional concept within the technological & innovation systems research methodology development through institutional innovations. In this paper, we will consider
Vitaliy Omelyanenko
doaj +1 more source
The turn of Russia’s foreign policy vector to the East stimulates the better understanding of political processes and phenomena in China, which have not yet been sufficiently considered in Russian academia and political elites. Unlike the lack of a clear
Leonid G. Abdrakhimov
doaj +1 more source
Poland’s defense preparations in the context of allied obligations. Legal, institutional, and instrumental aspects [PDF]
Poland’s accession to the North Atlantic Treaty Organization in 1999 was one of the most critical events in the Third Republic history. The integration process with NATO’s political and military structures is long-term and requires the constant ...
Marian Kuliczkowski
doaj +1 more source
Under the Radar: Muslims Deported, Detained, and Denied on Unsubstantiated Terrorism Allegations [PDF]
Through the targeted use of a wide set of immigration and law enforcement policies and actions, the U.S. government has cast Muslims as dangerous threats to national security, leaving Muslim communities across the United States vulnerable to ...
Amna Akbar +4 more
core
Research on Digital Forensics Analyzing Heterogeneous Internet of Things Incident Investigations
In the landscape of the Fourth Industrial Revolution, the integration of the Internet of Things (IoT) in smart-home technology presents intricate challenges for digital forensics.
Dong-Hyuk Shin +3 more
doaj +1 more source
The rapid development of science and technology has led to the emergence of a crisis in society. Science "pushes" religion, but does not offer a new moral code in its place. The definitions of "security" are almost as many and as controversial as postmodernism.
openaire +1 more source

