Results 331 to 340 of about 7,184,030 (395)
Some of the next articles are maybe not open access.

Global threats to human water security and river biodiversity

Nature, 2010
C. Vörösmarty   +11 more
exaly   +2 more sources

Asleep at the Keyboard? Assessing the Security of GitHub Copilot’s Code Contributions

IEEE Symposium on Security and Privacy, 2021
There is burgeoning interest in designing AI-based systems to assist humans in designing computing systems, including tools that automatically generate computer code.
H. Pearce   +4 more
semanticscholar   +1 more source

Building Security Where there is No Security

Journal of Peacebuilding & Development, 2007
Formal and accountable security systems are rare in many of the fragile states where the international community provides assistance. In most cases, individuals and communities create their own security mechanisms or accept compromised and unaccountable security provided by non-state actors.
Jonathan Temin   +2 more
openaire   +2 more sources

Securing the security

City, 2014
During the industrial era, the world's largest private security firm was the Pinkerton National Detective Agency.
openaire   +2 more sources

Security views

Computers & Security, 2001
US Senator Orrin Hatch, chairman of the Senate Judiciary Committee, stated at a recent hearing on copyright abuse that he wants to teach cyberpirates a lesson by destroying their computers if they have illegally downloaded copyright-protected material such as music or movies. During the hearing witnesses explained the dangers of using peer-to-peer file-
openaire   +6 more sources

Cryptography And Network Security

INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
-Cryptography and network security are foundational domains in the field of information technology and cybersecurity. As digital communication continues to expand, protecting data from unauthorized access, tampering, and interception is paramount.
Krisha Patel
semanticscholar   +1 more source

Security? What security? [job security]

Engineering & Technology, 2009
The paper discusses about job security. The article looks at two staples of insecurity. First, working for two superiors, both of which are demanding to prioritise their work, and second the budget slashing of the company. Case studies in a generalised situation are also presented. The information and advice given here conforms to what is believe to be
openaire   +2 more sources

Security and Trust [PDF]

open access: possible, 2011
Security and Trust offer two different prospectives on the problem of the correct interaction among software components. For many aspects, they represent complementary viewpoints. Moreover, in the study of the verification of non-functional properties of programs they represent a mainstream.
F Martinelli   +4 more
openaire   +5 more sources

Securify: Practical Security Analysis of Smart Contracts

Conference on Computer and Communications Security, 2018
Permissionless blockchains allow the execution of arbitrary programs (called smart contracts), enabling mutually untrusted entities to interact without relying on trusted third parties.
Petar Tsankov   +5 more
semanticscholar   +1 more source

Balkan Security

Southeast European and Black Sea Studies, 2003
(2003). Balkan security: What security? Whose security? Southeast European and Black Sea Studies: Vol. 3, No. 3, pp. 105-129.
openaire   +2 more sources

Home - About - Disclaimer - Privacy