Web engineering security: essential elements [PDF]
Security is an elusive target in today’s high-speed and extremely complex, Web enabled, information rich business environment. This paper presents the idea that there are essential, basic organizational elements that need to be identified, defined and ...
Glisson, W.B., Welland, R.
core +1 more source
An Approach for Information Security Risk Assessment in Cloud Environments [PDF]
Cloud technology has revolutionized the way computational resources are accessed, offering benefits that have led to widespread adoption. The risk of losing important data is one of the reasons why some organizations do not adopt the migration to a ...
Lidia Maria BRUMA
doaj +1 more source
Automated Generation of 5G Fine-Grained Threat Models: A Systematic Approach
Fifth-generation technology standard for broadband cellular networks, 5G, delivers a significant increase in data speeds and capacity, as well as new capabilities such as higher energy efficiency, lower latency, and the ability to connect a large number ...
Daniele Granata +2 more
doaj +1 more source
Security risk assessment and protection in the chemical and process industry [PDF]
This article describes a security risk assessment and protection methodology that was developed for use in the chemical- and process industry in Belgium. The approach of the method follows a risk-based approach that follows desing principles for chemical
American Petroleum Institute +19 more
core +1 more source
Risk Assessment of Power System Considering Frequency Dynamics and Cascading Process
Frequency security is vital to the safety of power systems and has been scrutinized for many years. The conventional frequency security analysis only checks whether the frequency after anticipated initial failures can remain in the normal range based on ...
Chao Luo, Jun Yang, Yuanzhang Sun
doaj +1 more source
Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE [PDF]
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are ...
AS Sodiya +12 more
core +1 more source
Towards Security Goals in Summative E-Assessment Security
The general security goals of a computer system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats.
Apampa, K.M, Argles, D, Wills, G.B
core +1 more source
Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot [PDF]
The rise of connectivity, digitalization, robotics, and artificial intelligence (AI) is rapidly changing our society and shaping its future development.
Cerrudo Cesar +13 more
core +2 more sources
Review on Less-Lethal Electrical Weapons: Evolution, Mechanisms, and Critical Technology
There is currently an urgent need for less-lethal weapons in police activities, such as combating crime, maintaining stability, and handling conflicts.
Lei Deng +9 more
doaj +1 more source
PTCR: Knowledge-Based Visual Question Answering Framework Based on Large Language Model [PDF]
Aiming at the problems of insufficient model input information and poor reasoning performance in knowledge-based visual question answering (VQA), this paper constructs a PTCR knowledge-based VQA framework based on large language model (LLM), which ...
XUE Di, LI Xin, LIU Mingshuai
doaj +1 more source

