Results 11 to 20 of about 10,120,233 (322)
The relevance of the chosen topic is due to the importance of the security environment in the framework of improving the management efficiency of such a socio-economic system as the state and its regions.
Andrii Ramskyi +4 more
doaj +2 more sources
SECURITY ENVIRONMENT: THEORETICAL AND METHODOLOGICAL PRINCIPLES
The research aims to form a conceptual vision of the "security environment" concept, to determine its structure and the content of concepts derived from it, as well as to establish logical and semantic connections between them. The need for such research
Vasyl Franchuk +4 more
semanticscholar +1 more source
Reconfiguring Wireless Environment via Intelligent Surfaces for 6G: Reflection, Modulation, and Security [PDF]
Reconfigurable intelligent surface (RIS) has been recognized as an essential enabling technique for the sixth-generation (6G) mobile communication network.
Jindan Xu +6 more
semanticscholar +1 more source
Sustainable Development of a Mobile Payment Security Environment Using Fintech Solutions
Financial technology (fintech) services have come to differentiate themselves from traditional financial services by offering unique, niche, and customized services. Mobile payment service (MPS) has emerged as the most crucial fintech service. While many
Yoo-seung Hwang +2 more
semanticscholar +1 more source
A versatile organisation: Mapping the military's core roles in a changing security environment
What roles are military institutions expected to play in today's rapidly changing security environment? How are they supposed to interact with the society they are tasked to protect?
Nina Wilén, Lisa Strömbom
semanticscholar +1 more source
Water Security in a Changing Environment: Concept, Challenges and Solutions
Water is of vital and critical importance to ecosystems and human societies. The effects of human activities on land and water are now large and extensive. These reflect physical changes to the environment.
B. Mishra +4 more
semanticscholar +1 more source
Recently, the Digital Twin (DT) technology has procured a lot of attention because of its applicability in the manufacturing and space industries. The DT environment involves the formation of a clone of the tangible object to perform simulations in the ...
Garima Thakur +5 more
semanticscholar +1 more source
AIT Cyber Range: Flexible Cyber Security Environment for Exercises, Training and Research
With the evolution of threats and attacks and the speed of automation, new modern training and learning environments are needed to support the challenges of digital organizations and societies.
Maria Leitner +9 more
semanticscholar +1 more source
On Secure Workflow Decentralisation on the Internet [PDF]
Decentralised workflow management systems are a new research area, where most work to-date has focused on the system's overall architecture. As little attention has been given to the security aspects in such systems, we follow a security driven approach,
Adi Shamir +28 more
core +3 more sources
CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment
Nowadays, the Internet of Things (IoT) concept plays a pivotal role in society and brings new capabilities to different industries. The number of IoT solutions in areas such as transportation and healthcare is increasing and new services are under ...
E. P. Neto +5 more
semanticscholar +1 more source

