Results 1 to 10 of about 271,319 (208)

Packet Key-Based End-to-End Security Management on a Blockchain Control Plane [PDF]

open access: yesSensors, 2019
The existing LTE mobile system uses the vertical model to handle the session-based security management. However, the goal of this paper is to propose a packet key-based security management scheme on the blockchain control plane to enhance the existing ...
Younchan Jung   +2 more
doaj   +2 more sources

CHALLENGES OF IMPLEMENTATION OF STATE SECURITY SERVICES [PDF]

open access: yesZeszyty Naukowe Wyższej Szkoły Finansów i Prawa w Bielsku-Białej, 2014
In the process of managing the country, it is advisable to look at broader measures of public administration in the implementation of specific national security services implemented to ensure existential and behavioral needs of society.
Marek Zbigniew KULISZ
doaj   +9 more sources

Evaluation of Threats Occurring During Provision of Road Transport Services in the EU Territory by Small and Medium-Sized Companies from Poland

open access: yesZeszyty Naukowe Wyższej Szkoły Finansów i Prawa w Bielsku-Białej, 2020
The aim of the paper is to conduct an analysis of various threats that may occur during road freight transport in the territory of the European Union. The research method consisted of a survey and the sample group selected for the survey were transport ...
Marek Krzywonos
doaj   +10 more sources

Assessment of the level of financial and economic security at machine-building enterprises: evidence from Ukraine [PDF]

open access: yesProblems and Perspectives in Management, 2020
Determining the level of financial and economic security of an enterprise allows assessing the real possibilities to confront internal and external challenges and defining the potential for future development. To develop proposals on assessing this level,
Alla Cherep   +3 more
doaj   +1 more source

Manajemen Keamanan Internet Menggunakan Metode Firewall Filtering Untuk Penyaringan Konten Pada Router Mikrotik RB1100

open access: yesComputer Science, 2023
The existence of security threats and internet abuse is often a problem for companies. Use of a VPN for access to web pages that contain negative and pornographic content which usually contain malware, viruses, trojans and others.
Sidik Sidik   +3 more
doaj   +1 more source

Management of Security and Security for Management Systems [PDF]

open access: yesJournal of Network and Systems Management, 2010
Political and military events, coupled with the accelerating frequency of cyber attacks on network/IT systems and technical revelations of management protocol insecurities, underscore the substantial risks associated with network, systems and applications management.
Carlos Becker Westphall, Peter Mueller
openaire   +2 more sources

Smart security management in secure devices [PDF]

open access: yesJournal of Cryptographic Engineering, 2016
Among other threats, secure components are subjected to physical attacks whose aim is to recover the secret information they store. Most of the work carried out to protect these components generally consists in developing protections (or countermeasures) taken one by one.
Robisson, Bruno   +6 more
openaire   +5 more sources

European Security Management at the National Level. A Comparative Analysis of Strategies for the Development of Defence Capability in the United Kingdom and Poland [PDF]

open access: yesPolish Political Science Yearbook, 2022
The article presents the positions of the UK and Polish governments on the importance of European security management as a factor influencing and shaping the defence doctrine in both states.
Joanna Iwancz, Bartlomiej H. Toszek
doaj   +1 more source

QUALITY CRITERIA FOR THE PRIVATE SECURITY COMPANIES AND CHALLENGES FOR THEIR IMPLEMENTATION IN CONTEMPORARY ENVIRONMENT [PDF]

open access: yesBezbednosni Dijalozi, 2023
In the past decades it is evident that the modern mega trends: globalization, urbanization, digitalization etc., and the new forms of security risks and threats had influenced and moderated the organization of state security.
Sanja Kermetchieva   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy