Results 11 to 20 of about 2,547,954 (246)
Legal interpretation of modern security risks [PDF]
With globalization, we have a pronounced paradigm of a risky society. That paradigm arises due to the uncontrolled production of socioeconomic, environmental and military risks.
Bardžić Žikica +1 more
doaj
Examination of security environment in many security papers and studies is focused primarily on analysis of external security environment of different countries.
Ladislav Hofreiter +4 more
doaj +1 more source
A trustworthy mobile agent infrastructure for network management [PDF]
Despite several advantages inherent in mobile-agent-based approaches to network management as compared to traditional SNMP-based approaches, industry is reluctant to adopt the mobile agent paradigm as a replacement for the existing manager-agent model ...
Koliousis, A., Sventek, J.S.
core +1 more source
Technology is changing the way we work more than ever before. Therefore, it is critical to understand the security threats associated with these advanced tools to protect systems and data.
Bader Alkhazi +3 more
doaj +1 more source
Distributed Reputation Management for Secure and Efficient Vehicular Edge Computing and Networks
Vehicular edge computing (VEC) is introduced to extend computing capacity to vehicular network edge recently. With the advent of VEC, service providers directly host services in close proximity of mobile vehicles for great improvements.
Xumin Huang +3 more
doaj +1 more source
Security dialogues: building better relationships between security and business [PDF]
In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes.
Ashenden, Debi, Lawrence, Darren
core +1 more source
Security Management Technology of Multilayer Satellite Internet Based on Blockchain
Satellite internet have the advantages of wide coverage, low latency, large transmission capacity and no geographical infl uence.It can provide ubiquitous internet access services for users all over the world.However, the heterogeneity of satellite ...
Ruijie ZHU +3 more
doaj
Security risk assessment and protection in the chemical and process industry [PDF]
This article describes a security risk assessment and protection methodology that was developed for use in the chemical- and process industry in Belgium. The approach of the method follows a risk-based approach that follows desing principles for chemical
American Petroleum Institute +19 more
core +1 more source
Security training: where are we now? [PDF]
In recent years, concern for the security of aid personnel working in violent environments has grown rapidly.
Koenraad Van Brabant
doaj
With the popularization of smart devices, companies are adopting bring-your-own-device or mobile office policies that utilize personal smart devices for work.
Sung-Hoon Lee +4 more
doaj +1 more source

