Results 11 to 20 of about 271,319 (208)
Security management in the field of critical infrastructure protection in the Republic of Serbia: State and perspectives [PDF]
Term "critical infrastructure" became part of the post-Cold War security discourse when the first legal and political acts, containing this term, emerged.
Stajić Ljubomir S. +2 more
doaj +1 more source
The impact of foreign markets globalization on the price and functionality of electronic access control systems [PDF]
Research background: The research, which is the subject of the paper, is based on the global expansion of the use of electronic access control systems using biometric data for user verification.
Boroš Martin, Lenko Filip, Velas Andrej
doaj +1 more source
Configuration management and security [PDF]
Proper configuration management is vital for host and network security. We outline the problems, especially for large-scale environments, and discuss the security aspects of a number of different configuration scenarios, including security appliances (e.g., firewalls), desktop and server computers, and PDAs.
Bellovin, Steven Michael, Bush, Randy
openaire +3 more sources
Global Economic Impacts of COVID 19 to Increase the Protection of Society By Using Thermal Imaging Cameras to Measure the Temperature of Human Body [PDF]
Research background: In 2020, a pandemic of COVID-19 has started. One of the symptoms is that a person has an elevated body temperature. One of the preventive measures against the spread of COVID-19 is the body temperature measuring.
Mariš Ladislav, Adamová Veronika
doaj +1 more source
Legal interpretation of modern security risks [PDF]
With globalization, we have a pronounced paradigm of a risky society. That paradigm arises due to the uncontrolled production of socioeconomic, environmental and military risks.
Bardžić Žikica +1 more
doaj
Data-Driven Security for Smart City Systems: Carving a Trail
Smart cities rely heavily on collecting and using data. Smart systems are implemented and deployed to provide intelligent features that help improve efficiency and quality of life. This creates a huge repository of data representing many aspects of smart
Nader Mohamed +3 more
doaj +1 more source
Distributed Reputation Management for Secure and Efficient Vehicular Edge Computing and Networks
Vehicular edge computing (VEC) is introduced to extend computing capacity to vehicular network edge recently. With the advent of VEC, service providers directly host services in close proximity of mobile vehicles for great improvements.
Xumin Huang +3 more
doaj +1 more source
Technology is changing the way we work more than ever before. Therefore, it is critical to understand the security threats associated with these advanced tools to protect systems and data.
Bader Alkhazi +3 more
doaj +1 more source
Hybrid war management with special reference to U.S [PDF]
Hybrid warfare captures the attention of professional and the general public, with in most cases the emphasis on the content of hybrid warfare. However, the success of hybrid warfare does not result from its content, but from the synergistic effect that ...
Mirković Vladan M.
doaj +1 more source
Secure Knowledge Management [PDF]
As the world is getting more and more technology savvy, the collection and distribution of information and knowledge need special attention. Progress has been made on the languages and tools needed for effective knowledge management and on the legal issues concerning the consumption and dissemination of critical knowledge.
S. Upadhyaya +2 more
openaire +1 more source

