Results 1 to 10 of about 6,929,434 (416)

A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements [PDF]

open access: yesarXiv, 2006
In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most important ones.
Bolzoni, D., Eck, P.A.T. van, Su, X.
arxiv   +18 more sources

Secure Scrum: Development of Secure Software with Scrum [PDF]

open access: yesarXiv, 2015
Nowadays, the use of agile software development methods like Scrum is common in industry and academia. Considering the current attacking landscape, it is clear that developing secure software should be a main concern in all software development projects.
Hof, Hans-Joachim, Pohl, Christoph
arxiv   +2 more sources

A Survey on Metaverse: Fundamentals, Security, and Privacy [PDF]

open access: yesIEEE Communications Surveys and Tutorials, 2022
Metaverse, as an evolving paradigm of the next-generation Internet, aims to build a fully immersive, hyper spatiotemporal, and self-sustaining virtual shared space for humans to play, work, and socialize.
Yuntao Wang   +6 more
semanticscholar   +1 more source

Declaración Conjunta XII Reunión de Alto Nivel Marruecos-España (1-2 de febrero 2023) – Déclaration Conjointe XXème Réunion de Haut Niveau Maroc-Espagne 1er et 2 Février 2023)

open access: yesPaix et Sécurité Internationales, 2023
DOCUMENTO 1. Declaración conjunta XII Reunión de Alto Nivel Marruecos-España (1-2 de febrero de 2023). DOCUMENTO 2. Déclaration-conjointe XIIème Réunion de Haut Niveau Maroc-Espagne (1er et 2 Février 2023)
Peace & Security
doaj   +1 more source

Resolución del Parlamento Europeo, de 19 de enero de 2023, sobre la situación de los periodistas marroquíes, en particular el caso de Omar Radi (español e inglés)

open access: yesPaix et Sécurité Internationales, 2023
Peace & Security. (2023). Resolución del Parlamento Europeo, de 19 de enero de 2023, sobre la situación de los periodistas marroquíes, en particular el caso de Omar Radi (español e inglés).
Peace & Security (ES)
doaj   +1 more source

Research on tor-based anonymous DDoS attack [PDF]

open access: yesMATEC Web of Conferences, 2021
Based on Tor, an anonymous DDoS attack is proposed, and the attacker of this attack is very difficult to trace due to the strong anonymity of Tor. Through conducting experiments in different network environment and making analyzation of security, the ...
Wang Rui   +4 more
doaj   +1 more source

The State of Food Security and Nutrition in the World 2021

open access: yes, 2021
Multi-sector nutrition programmes (MSNPs) have gained increasing prominence over the last two decades to address the many direct and underlying determinants of malnutrition.

semanticscholar   +1 more source

Security Reputation Metrics [PDF]

open access: yesEncyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg, 2021, 2023
Security reputation metrics (aka. security metrics) quantify the security levels of organization (e.g., hosting or Internet access providers) relative to comparable entities. They enable benchmarking and are essential tools for decision and policy-making in security, and may be used to govern and steer responsible parties towards investing in security ...
arxiv   +1 more source

Uncertainty Evaluation of Uranium Content Measurements by Redox Potential Titration Methods

open access: yesHe huaxue yu fangshe huaxue, 2023
Uranium content measurement is very important to nuclear material accounting and product quality control in nuclear bulk facilities. It needs high accuracy and precision.
TIAN Chuan   +10 more
doaj   +1 more source

Lessons from a Space Lab: An Image Acquisition Perspective

open access: yesInternational Journal of Aerospace Engineering, 2023
The use of deep learning (DL) algorithms has improved the performance of vision-based space applications in recent years. However, generating large amounts of annotated data for training these DL algorithms has proven challenging.
Leo Pauly   +12 more
doaj   +1 more source

Home - About - Disclaimer - Privacy