Preliminary Examination of Emergent Threat and Risk Landscapes in Intelligent Harvesting Robots
Recently, many farmers have started using robots to help with labour-intensive harvesting operations and deal with labour shortage that was also a negative consequence of the recent COVID-19 pandemic.
Nabil Moukafih +4 more
doaj +1 more source
Web engineering security: essential elements [PDF]
Security is an elusive target in today’s high-speed and extremely complex, Web enabled, information rich business environment. This paper presents the idea that there are essential, basic organizational elements that need to be identified, defined and ...
Glisson, W.B., Welland, R.
core +1 more source
An Approach for Information Security Risk Assessment in Cloud Environments [PDF]
Cloud technology has revolutionized the way computational resources are accessed, offering benefits that have led to widespread adoption. The risk of losing important data is one of the reasons why some organizations do not adopt the migration to a ...
Lidia Maria BRUMA
doaj +1 more source
A collective intelligence approach for building student's trustworthiness profile in online learning [PDF]
(c) 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works for resale or ...
Barolli, Leonard +4 more
core +1 more source
Secure Cloud-Edge Deployments, with Trust [PDF]
Assessing the security level of IoT applications to be deployed to heterogeneous Cloud-Edge infrastructures operated by different providers is a non-trivial task. In this article, we present a methodology that permits to express security requirements for
Brogi, Antonio +2 more
core +2 more sources
Towards Validating Risk Indicators Based on Measurement Theory (Extended version) [PDF]
Due to the lack of quantitative information and for cost-efficiency, most risk assessment methods use partially ordered values (e.g. high, medium, low) as risk indicators.
Morali, Ayse, Wieringa, Roel
core +8 more sources
Automated Generation of 5G Fine-Grained Threat Models: A Systematic Approach
Fifth-generation technology standard for broadband cellular networks, 5G, delivers a significant increase in data speeds and capacity, as well as new capabilities such as higher energy efficiency, lower latency, and the ability to connect a large number ...
Daniele Granata +2 more
doaj +1 more source
Risk Assessment of Power System Considering Frequency Dynamics and Cascading Process
Frequency security is vital to the safety of power systems and has been scrutinized for many years. The conventional frequency security analysis only checks whether the frequency after anticipated initial failures can remain in the normal range based on ...
Chao Luo, Jun Yang, Yuanzhang Sun
doaj +1 more source
Towards Security Goals in Summative E-Assessment Security
The general security goals of a computer system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats.
Apampa, K.M, Argles, D, Wills, G.B
core +1 more source
Review on Less-Lethal Electrical Weapons: Evolution, Mechanisms, and Critical Technology
There is currently an urgent need for less-lethal weapons in police activities, such as combating crime, maintaining stability, and handling conflicts.
Lei Deng +9 more
doaj +1 more source

