Results 11 to 20 of about 2,517,406 (276)
Security management in the field of critical infrastructure protection in the Republic of Serbia: State and perspectives [PDF]
Term "critical infrastructure" became part of the post-Cold War security discourse when the first legal and political acts, containing this term, emerged.
Stajić Ljubomir S. +2 more
doaj +1 more source
Data-Driven Security for Smart City Systems: Carving a Trail
Smart cities rely heavily on collecting and using data. Smart systems are implemented and deployed to provide intelligent features that help improve efficiency and quality of life. This creates a huge repository of data representing many aspects of smart
Nader Mohamed +3 more
doaj +1 more source
Distributed Reputation Management for Secure and Efficient Vehicular Edge Computing and Networks
Vehicular edge computing (VEC) is introduced to extend computing capacity to vehicular network edge recently. With the advent of VEC, service providers directly host services in close proximity of mobile vehicles for great improvements.
Xumin Huang +3 more
doaj +1 more source
A trustworthy mobile agent infrastructure for network management [PDF]
Despite several advantages inherent in mobile-agent-based approaches to network management as compared to traditional SNMP-based approaches, industry is reluctant to adopt the mobile agent paradigm as a replacement for the existing manager-agent model ...
Koliousis, A., Sventek, J.S.
core +1 more source
Security dialogues: building better relationships between security and business [PDF]
In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes.
Ashenden, Debi, Lawrence, Darren
core +1 more source
Hybrid war management with special reference to U.S [PDF]
Hybrid warfare captures the attention of professional and the general public, with in most cases the emphasis on the content of hybrid warfare. However, the success of hybrid warfare does not result from its content, but from the synergistic effect that ...
Mirković Vladan M.
doaj +1 more source
The international security environment is characterized by permanent changes such as, for instance, the increasing number of sources of insecurity (including juridical insecurity) and of the number of power cores and the emergence of new types of conflicts. However, there is no power core, be it old or more recent, that can compare to the United States,
Eugen SITEANU, Nicolae ZAVERGIU
+5 more sources
Technology is changing the way we work more than ever before. Therefore, it is critical to understand the security threats associated with these advanced tools to protect systems and data.
Bader Alkhazi +3 more
doaj +1 more source
Examination of security environment in many security papers and studies is focused primarily on analysis of external security environment of different countries.
Ladislav Hofreiter +4 more
doaj +1 more source
Security training: where are we now? [PDF]
In recent years, concern for the security of aid personnel working in violent environments has grown rapidly.
Koenraad Van Brabant
doaj

