Results 31 to 40 of about 1,773,552 (288)
Virtualization Security Assessment [PDF]
ABSTRACT Enterprises have been increasingly adopting server virtualization technologies in recent years. Security risk identification and related controls have also been receiving increased discussion lately. i Also, guidance is available on virtualization security configurations from independent groups, such as benchmarks from the Center for Internet ...
openaire +1 more source
Influence of Temperature on Launching Characteristics of Lithium-Battery-Powered Reluctance Launcher
Lithium-battery-powered reluctance launcher is a device that utilizes lithium batteries to directly discharge into coils, generating electromagnetic force to accelerate an armature.
Zhichao Yu +8 more
doaj +1 more source
CIL-LLM: Incremental Learning Framework Based on Large Language Models for Category Classification [PDF]
To enhance classification accuracy in class-incremental learning (CIL) models for text classification and mitigate the issue of catastrophic forgetting, this paper introduces a CIL framework based on a large language model (CIL-LLM).
WANG Xiaoyu, LI Xin, HU Mianning, XUE Di
doaj +1 more source
Anti-terrorist security assessment [PDF]
Contemporary terrorism is a multifaceted and controversial concept, loaded with political instrumentalization, because of which it is very difficult to find scientifically based framework for its analysis.
Dragišić Zoran +2 more
doaj +1 more source
Economic Efficiency of the Electronic Security Systems in Security Management of Commercial Activities [PDF]
The purpose of this study is to identify some general patterns of the efficiency of electronic security systems used in the security management of the commercial activities and spaces.
Marian NASTASE +1 more
doaj
A New Fuzzy MCDM Framework to Evaluate E-Government Security Strategy
Ensuring security of e-government applications and infrastructures is crucial to maintain trust among stakeholders to store, process and exchange information over the e-government systems. Due to dynamic and continuous threats on e-government information
Hwang, Junseok, Syamsuddin, Irfan
core +1 more source
Risk and Business Goal Based Security Requirement and Countermeasure Prioritization [PDF]
Companies are under pressure to be in control of their assets but at the same time they must operate as efficiently as possible. This means that they aim to implement “good-enough security” but need to be able to justify their security investment plans ...
A. Herrmann +7 more
core +2 more sources
A Hybrid Method for Measuring Service Supply Chain Performance Management in IT Service Providers
Despite the increasing development of research in the service supply chain, the IT service supply chain measurements have not grown proportionally. In this paper, based on a survey the key indicators in the IT service supply chain and ranking them, a ...
Reza Kalantari +2 more
doaj
Host security assessment method based on attack graph
In order to solve the problems of inaccurate calculation of host security value and ignoring host correlation in attack graph, a host security assessment method based on attack graph was proposed.First, the host attack graph was generated to quantify the
Hongyu YANG, Haihang YUAN, Liang ZHANG
doaj
Short-circuit faults in a receiving-end power system can lead to blocking events of the feed-in high-voltage direct-current (HVDC) systems, which may further result in system instability.
Qiufang Zhang +5 more
doaj +1 more source

