Results 21 to 30 of about 1,773,552 (288)

Web engineering security: essential elements [PDF]

open access: yes, 2007
Security is an elusive target in today’s high-speed and extremely complex, Web enabled, information rich business environment. This paper presents the idea that there are essential, basic organizational elements that need to be identified, defined and ...
Glisson, W.B., Welland, R.
core   +1 more source

An Approach for Information Security Risk Assessment in Cloud Environments [PDF]

open access: yesInformatică economică, 2020
Cloud technology has revolutionized the way computational resources are accessed, offering benefits that have led to widespread adoption. The risk of losing important data is one of the reasons why some organizations do not adopt the migration to a ...
Lidia Maria BRUMA
doaj   +1 more source

Automated Generation of 5G Fine-Grained Threat Models: A Systematic Approach

open access: yesIEEE Access, 2023
Fifth-generation technology standard for broadband cellular networks, 5G, delivers a significant increase in data speeds and capacity, as well as new capabilities such as higher energy efficiency, lower latency, and the ability to connect a large number ...
Daniele Granata   +2 more
doaj   +1 more source

Security risk assessment and protection in the chemical and process industry [PDF]

open access: yes, 2014
This article describes a security risk assessment and protection methodology that was developed for use in the chemical- and process industry in Belgium. The approach of the method follows a risk-based approach that follows desing principles for chemical
American Petroleum Institute   +19 more
core   +1 more source

Risk Assessment of Power System Considering Frequency Dynamics and Cascading Process

open access: yesEnergies, 2018
Frequency security is vital to the safety of power systems and has been scrutinized for many years. The conventional frequency security analysis only checks whether the frequency after anticipated initial failures can remain in the normal range based on ...
Chao Luo, Jun Yang, Yuanzhang Sun
doaj   +1 more source

Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE [PDF]

open access: yes, 2015
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are ...
AS Sodiya   +12 more
core   +1 more source

Towards Security Goals in Summative E-Assessment Security

open access: yes, 2009
The general security goals of a computer system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats.
Apampa, K.M, Argles, D, Wills, G.B
core   +1 more source

Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot [PDF]

open access: yes, 2018
The rise of connectivity, digitalization, robotics, and artificial intelligence (AI) is rapidly changing our society and shaping its future development.
Cerrudo Cesar   +13 more
core   +2 more sources

Review on Less-Lethal Electrical Weapons: Evolution, Mechanisms, and Critical Technology

open access: yesIEEE Access
There is currently an urgent need for less-lethal weapons in police activities, such as combating crime, maintaining stability, and handling conflicts.
Lei Deng   +9 more
doaj   +1 more source

PTCR: Knowledge-Based Visual Question Answering Framework Based on Large Language Model [PDF]

open access: yesJisuanji kexue yu tansuo
Aiming at the problems of insufficient model input information and poor reasoning performance in knowledge-based visual question answering (VQA), this paper constructs a PTCR knowledge-based VQA framework based on large language model (LLM), which ...
XUE Di, LI Xin, LIU Mingshuai
doaj   +1 more source

Home - About - Disclaimer - Privacy