Results 41 to 50 of about 53,613 (192)

Privacy and Security Management in Intelligent Transportation System

open access: yesIEEE Access, 2020
Metropolitan transportation is a dynamic and non-linear complex system. In such a system, there are possibilities of altering, monitoring, forging, and accessing private, public, and resource information of depot staff and communicating agents by ...
Suresh Chavhan   +5 more
doaj   +1 more source

New Perspectives on the Use of Satellite Information in Contemporary Armed Conflicts and Crisis Management

open access: yesPolish Political Science Yearbook, 2023
Among current global threats, the risk of developing an emergency requires a comprehensive approach from all entities involved in crisis management. Despite the advanced technologies available to predict each threat, taking appropriate countermeasures is
Krzysztof Goniewicz
doaj   +1 more source

THE INFORMATION CONFIDENTIALITY AND CYBER SECURITY IN MEDICAL INSTITUTIONS [PDF]

open access: yesAnnals of the University of Oradea: Economic Science, 2015
The information confidentiality and cyber security risk affects the right to confidentiality and privacy of the patient, as regulated in Romania by the Law 46/2002.
SABAU-POPA CLAUDIA DIANA   +3 more
doaj  

Attack and defence methods in cyber‐physical power system

open access: yesIET Energy Systems Integration, 2022
With the development of digitalisation and intelligence, the power system has been upgraded from the traditional single energy transmission and conversion system to a complex cyber‐physical power system (CPPS) with tightly coupled energy and information ...
Ting Yang, Yuzhe Liu, Wei Li
doaj   +1 more source

Enhancing Security Operations Center: Wazuh Security Event Response with Retrieval-Augmented-Generation-Driven Copilot

open access: yesSensors
The sophistication of cyberthreats demands more efficient and intelligent tools to support Security Operations Centers (SOCs) in managing and mitigating incidents.
Ismail   +7 more
doaj   +1 more source

Blockchain-Based Wireless Sensor Networks for Malicious Node Detection: A Survey

open access: yesIEEE Access, 2021
Wireless Sensor Networks (WSNs) are broadly applied for various applications in tracking and surveillance due to their ease of use and other distinctive characteristics compelled by real-time cooperation among the sensor nodes.
Lakshmana Kumar Ramasamy   +5 more
doaj   +1 more source

Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems

open access: yesFuture Internet, 2013
The technology of Security Information and Event Management (SIEM) becomes one of the most important research applications in the area of computer network security.
Igor Saenko   +3 more
doaj   +1 more source

The Role of Implementation of Service Management and Security Frameworks in Information Technology Service Continuity [PDF]

open access: yesمطالعات مدیریت کسب و کار هوشمند, 2019
Competitive business environment and high dependency to the services has caused organizations to be evaluated based on the level of their ability in providing continuous services.
Soheila Jafarnezhad   +1 more
doaj   +1 more source

Human-as-a-security-sensor for harvesting threat intelligence

open access: yesCybersecurity, 2019
Humans are commonly seen as the weakest link in corporate information security. This led to a lot of effort being put into security training and awareness campaigns, which resulted in employees being less likely the target of successful attacks. Existing
Manfred Vielberth   +2 more
doaj   +1 more source

Technical note: Efficient online source identification algorithm for integration within a contamination event management system [PDF]

open access: yesDrinking Water Engineering and Science, 2017
Drinking water distribution networks are part of critical infrastructures and are exposed to a number of different risks. One of them is the risk of unintended or deliberate contamination of the drinking water within the pipe network.
J. Deuerlein, L. Meyer-Harries, N. Guth
doaj   +1 more source

Home - About - Disclaimer - Privacy