Results 251 to 260 of about 10,120,233 (322)
Some of the next articles are maybe not open access.

Security environment theories

Russian ‘Hybrid Warfare’ and the Annexation of Crimea, 2021
openaire   +2 more sources

Securing industrial environments

Network Security, 2022
It hardly comes as a surprise that the Covid-19 pandemic has pushed forward many digital initiatives worldwide. But while this hasty shift towards digitisation has affected almost every industry, it is critical that those in the industrial sector are paying extra attention, and now is the time to do so as organisations start to rethink their budgets ...
openaire   +1 more source

Secure virtualised environment

The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), 2014
Cloud computing is a technological advancement that provide resources through internet on pay-as-you-go basis. Cloud computing uses virtualisation technology to enhance the efficiency and effectiveness of its advantages. Virtualisation is the key to consolidate the computing resources to run multiple instances on each hardware, increasing the ...
Chouhan, Pushpinder Kaur   +4 more
openaire   +2 more sources

A Survey on Space-Air-Ground-Sea Integrated Network Security in 6G

IEEE Communications Surveys and Tutorials, 2022
Space-air-ground-sea integrated network (SAGSIN), which integrates satellite communication networks, aerial networks, terrestrial networks, and marine communication networks, has been widely envisioned as a promising network architecture for 6G.
Hongzhi Guo   +4 more
semanticscholar   +1 more source

Secure environments

Nursing Older People, 2002
One of the key elements of the strategy of the Mental Health and Older People Forum for 2001-02 was to look at the needs of older people who are being cared for in secure environments. This has proved to be a difficult issue to explore, as there appears to be a limited amount of information readily available.
openaire   +2 more sources

Taiwan's Security Environment

The Changing of the Guard, 2019
M. Lasater
openaire   +2 more sources

Wireless Environment Security

2020
The communication through the wireless environment is open, which completely differs from the wired. This open environment communication can be accessed by users including illegitimate and thus increases the vulnerability for malicious attacks. For that reason, motivation comes to study about the different possible security challenges, threats, and to ...
null Vidushi   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy