Results 31 to 40 of about 1,773,552 (288)

Virtualization Security Assessment [PDF]

open access: yesInformation Security Journal: A Global Perspective, 2009
ABSTRACT Enterprises have been increasingly adopting server virtualization technologies in recent years. Security risk identification and related controls have also been receiving increased discussion lately. i Also, guidance is available on virtualization security configurations from independent groups, such as benchmarks from the Center for Internet ...
openaire   +1 more source

Influence of Temperature on Launching Characteristics of Lithium-Battery-Powered Reluctance Launcher

open access: yesIEEE Access
Lithium-battery-powered reluctance launcher is a device that utilizes lithium batteries to directly discharge into coils, generating electromagnetic force to accelerate an armature.
Zhichao Yu   +8 more
doaj   +1 more source

CIL-LLM: Incremental Learning Framework Based on Large Language Models for Category Classification [PDF]

open access: yesJisuanji kexue yu tansuo
To enhance classification accuracy in class-incremental learning (CIL) models for text classification and mitigate the issue of catastrophic forgetting, this paper introduces a CIL framework based on a large language model (CIL-LLM).
WANG Xiaoyu, LI Xin, HU Mianning, XUE Di
doaj   +1 more source

Anti-terrorist security assessment [PDF]

open access: yesВојно дело, 2014
Contemporary terrorism is a multifaceted and controversial concept, loaded with political instrumentalization, because of which it is very difficult to find scientifically based framework for its analysis.
Dragišić Zoran   +2 more
doaj   +1 more source

Economic Efficiency of the Electronic Security Systems in Security Management of Commercial Activities [PDF]

open access: yesRevista de Management Comparat International, 2014
The purpose of this study is to identify some general patterns of the efficiency of electronic security systems used in the security management of the commercial activities and spaces.
Marian NASTASE   +1 more
doaj  

A New Fuzzy MCDM Framework to Evaluate E-Government Security Strategy

open access: yes, 2010
Ensuring security of e-government applications and infrastructures is crucial to maintain trust among stakeholders to store, process and exchange information over the e-government systems. Due to dynamic and continuous threats on e-government information
Hwang, Junseok, Syamsuddin, Irfan
core   +1 more source

Risk and Business Goal Based Security Requirement and Countermeasure Prioritization [PDF]

open access: yes, 2012
Companies are under pressure to be in control of their assets but at the same time they must operate as efficiently as possible. This means that they aim to implement “good-enough security” but need to be able to justify their security investment plans ...
A. Herrmann   +7 more
core   +2 more sources

A Hybrid Method for Measuring Service Supply Chain Performance Management in IT Service Providers

open access: yesInternational Journal of Information and Communication Technology Research, 2020
Despite the increasing development of research in the service supply chain, the IT service supply chain measurements have not  grown proportionally. In this paper, based on a  survey the key indicators in the IT service supply chain and ranking them, a ...
Reza Kalantari   +2 more
doaj  

Host security assessment method based on attack graph

open access: yesTongxin xuebao, 2022
In order to solve the problems of inaccurate calculation of host security value and ignoring host correlation in attack graph, a host security assessment method based on attack graph was proposed.First, the host attack graph was generated to quantify the
Hongyu YANG, Haihang YUAN, Liang ZHANG
doaj  

Security Assessment and Coordinated Emergency Control Strategy for Power Systems with Multi-Infeed HVDCs

open access: yesEnergies, 2020
Short-circuit faults in a receiving-end power system can lead to blocking events of the feed-in high-voltage direct-current (HVDC) systems, which may further result in system instability.
Qiufang Zhang   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy