Results 1 to 10 of about 6,929,434 (416)
A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements [PDF]
In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most important ones.
Bolzoni, D., Eck, P.A.T. van, Su, X.
arxiv +18 more sources
Secure Scrum: Development of Secure Software with Scrum [PDF]
Nowadays, the use of agile software development methods like Scrum is common in industry and academia. Considering the current attacking landscape, it is clear that developing secure software should be a main concern in all software development projects.
Hof, Hans-Joachim, Pohl, Christoph
arxiv +2 more sources
A Survey on Metaverse: Fundamentals, Security, and Privacy [PDF]
Metaverse, as an evolving paradigm of the next-generation Internet, aims to build a fully immersive, hyper spatiotemporal, and self-sustaining virtual shared space for humans to play, work, and socialize.
Yuntao Wang+6 more
semanticscholar +1 more source
DOCUMENTO 1. Declaración conjunta XII Reunión de Alto Nivel Marruecos-España (1-2 de febrero de 2023). DOCUMENTO 2. Déclaration-conjointe XIIème Réunion de Haut Niveau Maroc-Espagne (1er et 2 Février 2023)
Peace & Security
doaj +1 more source
Peace & Security. (2023). Resolución del Parlamento Europeo, de 19 de enero de 2023, sobre la situación de los periodistas marroquíes, en particular el caso de Omar Radi (español e inglés).
Peace & Security (ES)
doaj +1 more source
Research on tor-based anonymous DDoS attack [PDF]
Based on Tor, an anonymous DDoS attack is proposed, and the attacker of this attack is very difficult to trace due to the strong anonymity of Tor. Through conducting experiments in different network environment and making analyzation of security, the ...
Wang Rui+4 more
doaj +1 more source
The State of Food Security and Nutrition in the World 2021
Multi-sector nutrition programmes (MSNPs) have gained increasing prominence over the last two decades to address the many direct and underlying determinants of malnutrition.
semanticscholar +1 more source
Security Reputation Metrics [PDF]
Security reputation metrics (aka. security metrics) quantify the security levels of organization (e.g., hosting or Internet access providers) relative to comparable entities. They enable benchmarking and are essential tools for decision and policy-making in security, and may be used to govern and steer responsible parties towards investing in security ...
arxiv +1 more source
Uncertainty Evaluation of Uranium Content Measurements by Redox Potential Titration Methods
Uranium content measurement is very important to nuclear material accounting and product quality control in nuclear bulk facilities. It needs high accuracy and precision.
TIAN Chuan+10 more
doaj +1 more source
Lessons from a Space Lab: An Image Acquisition Perspective
The use of deep learning (DL) algorithms has improved the performance of vision-based space applications in recent years. However, generating large amounts of annotated data for training these DL algorithms has proven challenging.
Leo Pauly+12 more
doaj +1 more source