Results 1 to 10 of about 8,813,848 (351)

Packet Key-Based End-to-End Security Management on a Blockchain Control Plane. [PDF]

open access: yesSensors (Basel), 2019
The existing LTE mobile system uses the vertical model to handle the session-based security management. However, the goal of this paper is to propose a packet key-based security management scheme on the blockchain control plane to enhance the existing ...
Jung Y, Peradilla M, Agulto R.
europepmc   +2 more sources

Blockchain 6G-Based Wireless Network Security Management with Optimization Using Machine Learning Techniques. [PDF]

open access: yesSensors (Basel)
6G mobile network technology will set new standards to meet performance goals that are too ambitious for 5G networks to satisfy. The limitations of 5G networks have been apparent with the deployment of more and more 5G networks, which certainly ...
Chinnasamy P   +5 more
europepmc   +2 more sources

Assessment of the level of financial and economic security at machine-building enterprises: evidence from Ukraine [PDF]

open access: yesProblems and Perspectives in Management, 2020
Determining the level of financial and economic security of an enterprise allows assessing the real possibilities to confront internal and external challenges and defining the potential for future development. To develop proposals on assessing this level,
Alla Cherep   +3 more
doaj   +1 more source

European Security Management at the National Level. A Comparative Analysis of Strategies for the Development of Defence Capability in the United Kingdom and Poland [PDF]

open access: yesPolish Political Science Yearbook, 2022
The article presents the positions of the UK and Polish governments on the importance of European security management as a factor influencing and shaping the defence doctrine in both states.
Joanna Iwancz, Bartlomiej H. Toszek
doaj   +1 more source

Management of Security and Security for Management Systems [PDF]

open access: yesJournal of Network and Systems Management, 2010
Political and military events, coupled with the accelerating frequency of cyber attacks on network/IT systems and technical revelations of management protocol insecurities, underscore the substantial risks associated with network, systems and applications management.
Carlos Becker Westphall, Peter Mueller
openaire   +2 more sources

Smart security management in secure devices [PDF]

open access: yesJournal of Cryptographic Engineering, 2016
Among other threats, secure components are subjected to physical attacks whose aim is to recover the secret information they store. Most of the work carried out to protect these components generally consists in developing protections (or countermeasures) taken one by one.
Robisson, Bruno   +6 more
openaire   +7 more sources

Evaluation of Threats Occurring During Provision of Road Transport Services in the EU Territory by Small and Medium-Sized Companies from Poland

open access: yesZeszyty Naukowe Wyższej Szkoły Finansów i Prawa w Bielsku-Białej, 2020
The aim of the paper is to conduct an analysis of various threats that may occur during road freight transport in the territory of the European Union. The research method consisted of a survey and the sample group selected for the survey were transport ...
Marek Krzywonos
doaj   +8 more sources

QUALITY CRITERIA FOR THE PRIVATE SECURITY COMPANIES AND CHALLENGES FOR THEIR IMPLEMENTATION IN CONTEMPORARY ENVIRONMENT [PDF]

open access: yesBezbednosni Dijalozi, 2023
In the past decades it is evident that the modern mega trends: globalization, urbanization, digitalization etc., and the new forms of security risks and threats had influenced and moderated the organization of state security.
Sanja Kermetchieva   +1 more
doaj   +1 more source

Data-Driven Security for Smart City Systems: Carving a Trail

open access: yesIEEE Access, 2020
Smart cities rely heavily on collecting and using data. Smart systems are implemented and deployed to provide intelligent features that help improve efficiency and quality of life. This creates a huge repository of data representing many aspects of smart
Nader Mohamed   +3 more
doaj   +1 more source

Security management in the field of critical infrastructure protection in the Republic of Serbia: State and perspectives [PDF]

open access: yesZbornik Radova: Pravni Fakultet u Novom Sadu, 2020
Term "critical infrastructure" became part of the post-Cold War security discourse when the first legal and political acts, containing this term, emerged.
Stajić Ljubomir S.   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy