Results 21 to 30 of about 1,764,419 (291)

Preliminary Examination of Emergent Threat and Risk Landscapes in Intelligent Harvesting Robots

open access: yesApplied Sciences, 2022
Recently, many farmers have started using robots to help with labour-intensive harvesting operations and deal with labour shortage that was also a negative consequence of the recent COVID-19 pandemic.
Nabil Moukafih   +4 more
doaj   +1 more source

Web engineering security: essential elements [PDF]

open access: yes, 2007
Security is an elusive target in today’s high-speed and extremely complex, Web enabled, information rich business environment. This paper presents the idea that there are essential, basic organizational elements that need to be identified, defined and ...
Glisson, W.B., Welland, R.
core   +1 more source

An Approach for Information Security Risk Assessment in Cloud Environments [PDF]

open access: yesInformatică economică, 2020
Cloud technology has revolutionized the way computational resources are accessed, offering benefits that have led to widespread adoption. The risk of losing important data is one of the reasons why some organizations do not adopt the migration to a ...
Lidia Maria BRUMA
doaj   +1 more source

A collective intelligence approach for building student's trustworthiness profile in online learning [PDF]

open access: yes, 2014
(c) 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works for resale or ...
Barolli, Leonard   +4 more
core   +1 more source

Secure Cloud-Edge Deployments, with Trust [PDF]

open access: yes, 2019
Assessing the security level of IoT applications to be deployed to heterogeneous Cloud-Edge infrastructures operated by different providers is a non-trivial task. In this article, we present a methodology that permits to express security requirements for
Brogi, Antonio   +2 more
core   +2 more sources

Towards Validating Risk Indicators Based on Measurement Theory (Extended version) [PDF]

open access: yes, 2010
Due to the lack of quantitative information and for cost-efficiency, most risk assessment methods use partially ordered values (e.g. high, medium, low) as risk indicators.
Morali, Ayse, Wieringa, Roel
core   +8 more sources

Automated Generation of 5G Fine-Grained Threat Models: A Systematic Approach

open access: yesIEEE Access, 2023
Fifth-generation technology standard for broadband cellular networks, 5G, delivers a significant increase in data speeds and capacity, as well as new capabilities such as higher energy efficiency, lower latency, and the ability to connect a large number ...
Daniele Granata   +2 more
doaj   +1 more source

Risk Assessment of Power System Considering Frequency Dynamics and Cascading Process

open access: yesEnergies, 2018
Frequency security is vital to the safety of power systems and has been scrutinized for many years. The conventional frequency security analysis only checks whether the frequency after anticipated initial failures can remain in the normal range based on ...
Chao Luo, Jun Yang, Yuanzhang Sun
doaj   +1 more source

Towards Security Goals in Summative E-Assessment Security

open access: yes, 2009
The general security goals of a computer system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats.
Apampa, K.M, Argles, D, Wills, G.B
core   +1 more source

Review on Less-Lethal Electrical Weapons: Evolution, Mechanisms, and Critical Technology

open access: yesIEEE Access
There is currently an urgent need for less-lethal weapons in police activities, such as combating crime, maintaining stability, and handling conflicts.
Lei Deng   +9 more
doaj   +1 more source

Home - About - Disclaimer - Privacy