Packet Key-Based End-to-End Security Management on a Blockchain Control Plane. [PDF]
The existing LTE mobile system uses the vertical model to handle the session-based security management. However, the goal of this paper is to propose a packet key-based security management scheme on the blockchain control plane to enhance the existing ...
Jung Y, Peradilla M, Agulto R.
europepmc +2 more sources
Blockchain 6G-Based Wireless Network Security Management with Optimization Using Machine Learning Techniques. [PDF]
6G mobile network technology will set new standards to meet performance goals that are too ambitious for 5G networks to satisfy. The limitations of 5G networks have been apparent with the deployment of more and more 5G networks, which certainly ...
Chinnasamy P+5 more
europepmc +2 more sources
Assessment of the level of financial and economic security at machine-building enterprises: evidence from Ukraine [PDF]
Determining the level of financial and economic security of an enterprise allows assessing the real possibilities to confront internal and external challenges and defining the potential for future development. To develop proposals on assessing this level,
Alla Cherep+3 more
doaj +1 more source
European Security Management at the National Level. A Comparative Analysis of Strategies for the Development of Defence Capability in the United Kingdom and Poland [PDF]
The article presents the positions of the UK and Polish governments on the importance of European security management as a factor influencing and shaping the defence doctrine in both states.
Joanna Iwancz, Bartlomiej H. Toszek
doaj +1 more source
Management of Security and Security for Management Systems [PDF]
Political and military events, coupled with the accelerating frequency of cyber attacks on network/IT systems and technical revelations of management protocol insecurities, underscore the substantial risks associated with network, systems and applications management.
Carlos Becker Westphall, Peter Mueller
openaire +2 more sources
Smart security management in secure devices [PDF]
Among other threats, secure components are subjected to physical attacks whose aim is to recover the secret information they store. Most of the work carried out to protect these components generally consists in developing protections (or countermeasures) taken one by one.
Robisson, Bruno+6 more
openaire +7 more sources
The aim of the paper is to conduct an analysis of various threats that may occur during road freight transport in the territory of the European Union. The research method consisted of a survey and the sample group selected for the survey were transport ...
Marek Krzywonos
doaj +8 more sources
QUALITY CRITERIA FOR THE PRIVATE SECURITY COMPANIES AND CHALLENGES FOR THEIR IMPLEMENTATION IN CONTEMPORARY ENVIRONMENT [PDF]
In the past decades it is evident that the modern mega trends: globalization, urbanization, digitalization etc., and the new forms of security risks and threats had influenced and moderated the organization of state security.
Sanja Kermetchieva+1 more
doaj +1 more source
Data-Driven Security for Smart City Systems: Carving a Trail
Smart cities rely heavily on collecting and using data. Smart systems are implemented and deployed to provide intelligent features that help improve efficiency and quality of life. This creates a huge repository of data representing many aspects of smart
Nader Mohamed+3 more
doaj +1 more source
Security management in the field of critical infrastructure protection in the Republic of Serbia: State and perspectives [PDF]
Term "critical infrastructure" became part of the post-Cold War security discourse when the first legal and political acts, containing this term, emerged.
Stajić Ljubomir S.+2 more
doaj +1 more source