Results 41 to 50 of about 53,613 (192)
Privacy and Security Management in Intelligent Transportation System
Metropolitan transportation is a dynamic and non-linear complex system. In such a system, there are possibilities of altering, monitoring, forging, and accessing private, public, and resource information of depot staff and communicating agents by ...
Suresh Chavhan +5 more
doaj +1 more source
Among current global threats, the risk of developing an emergency requires a comprehensive approach from all entities involved in crisis management. Despite the advanced technologies available to predict each threat, taking appropriate countermeasures is
Krzysztof Goniewicz
doaj +1 more source
THE INFORMATION CONFIDENTIALITY AND CYBER SECURITY IN MEDICAL INSTITUTIONS [PDF]
The information confidentiality and cyber security risk affects the right to confidentiality and privacy of the patient, as regulated in Romania by the Law 46/2002.
SABAU-POPA CLAUDIA DIANA +3 more
doaj
Attack and defence methods in cyber‐physical power system
With the development of digitalisation and intelligence, the power system has been upgraded from the traditional single energy transmission and conversion system to a complex cyber‐physical power system (CPPS) with tightly coupled energy and information ...
Ting Yang, Yuzhe Liu, Wei Li
doaj +1 more source
The sophistication of cyberthreats demands more efficient and intelligent tools to support Security Operations Centers (SOCs) in managing and mitigating incidents.
Ismail +7 more
doaj +1 more source
Blockchain-Based Wireless Sensor Networks for Malicious Node Detection: A Survey
Wireless Sensor Networks (WSNs) are broadly applied for various applications in tracking and surveillance due to their ease of use and other distinctive characteristics compelled by real-time cooperation among the sensor nodes.
Lakshmana Kumar Ramasamy +5 more
doaj +1 more source
Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems
The technology of Security Information and Event Management (SIEM) becomes one of the most important research applications in the area of computer network security.
Igor Saenko +3 more
doaj +1 more source
The Role of Implementation of Service Management and Security Frameworks in Information Technology Service Continuity [PDF]
Competitive business environment and high dependency to the services has caused organizations to be evaluated based on the level of their ability in providing continuous services.
Soheila Jafarnezhad +1 more
doaj +1 more source
Human-as-a-security-sensor for harvesting threat intelligence
Humans are commonly seen as the weakest link in corporate information security. This led to a lot of effort being put into security training and awareness campaigns, which resulted in employees being less likely the target of successful attacks. Existing
Manfred Vielberth +2 more
doaj +1 more source
Technical note: Efficient online source identification algorithm for integration within a contamination event management system [PDF]
Drinking water distribution networks are part of critical infrastructures and are exposed to a number of different risks. One of them is the risk of unintended or deliberate contamination of the drinking water within the pipe network.
J. Deuerlein, L. Meyer-Harries, N. Guth
doaj +1 more source

