Results 11 to 20 of about 2,517,406 (276)

Security management in the field of critical infrastructure protection in the Republic of Serbia: State and perspectives [PDF]

open access: yesZbornik Radova: Pravni Fakultet u Novom Sadu, 2020
Term "critical infrastructure" became part of the post-Cold War security discourse when the first legal and political acts, containing this term, emerged.
Stajić Ljubomir S.   +2 more
doaj   +1 more source

Data-Driven Security for Smart City Systems: Carving a Trail

open access: yesIEEE Access, 2020
Smart cities rely heavily on collecting and using data. Smart systems are implemented and deployed to provide intelligent features that help improve efficiency and quality of life. This creates a huge repository of data representing many aspects of smart
Nader Mohamed   +3 more
doaj   +1 more source

Distributed Reputation Management for Secure and Efficient Vehicular Edge Computing and Networks

open access: yesIEEE Access, 2017
Vehicular edge computing (VEC) is introduced to extend computing capacity to vehicular network edge recently. With the advent of VEC, service providers directly host services in close proximity of mobile vehicles for great improvements.
Xumin Huang   +3 more
doaj   +1 more source

A trustworthy mobile agent infrastructure for network management [PDF]

open access: yes, 2007
Despite several advantages inherent in mobile-agent-based approaches to network management as compared to traditional SNMP-based approaches, industry is reluctant to adopt the mobile agent paradigm as a replacement for the existing manager-agent model ...
Koliousis, A., Sventek, J.S.
core   +1 more source

Security dialogues: building better relationships between security and business [PDF]

open access: yes, 2016
In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes.
Ashenden, Debi, Lawrence, Darren
core   +1 more source

Hybrid war management with special reference to U.S [PDF]

open access: yesZbornik Radova: Pravni Fakultet u Novom Sadu, 2022
Hybrid warfare captures the attention of professional and the general public, with in most cases the emphasis on the content of hybrid warfare. However, the success of hybrid warfare does not result from its content, but from the synergistic effect that ...
Mirković Vladan M.
doaj   +1 more source

Security Management

open access: yesAnnals: Series on Military Sciences, 2015
The international security environment is characterized by permanent changes such as, for instance, the increasing number of sources of insecurity (including juridical insecurity) and of the number of power cores and the emergence of new types of conflicts. However, there is no power core, be it old or more recent, that can compare to the United States,
Eugen SITEANU, Nicolae ZAVERGIU
  +5 more sources

Assessment of the Impact of Information Security Awareness Training Methods on Knowledge, Attitude, and Behavior

open access: yesIEEE Access, 2022
Technology is changing the way we work more than ever before. Therefore, it is critical to understand the security threats associated with these advanced tools to protect systems and data.
Bader Alkhazi   +3 more
doaj   +1 more source

New Approaches to the Analysis of the Security Environment and their Importance for Security Management

open access: yesCommunications, 2015
Examination of security environment in many security papers and studies is focused primarily on analysis of external security environment of different countries.
Ladislav Hofreiter   +4 more
doaj   +1 more source

Security training: where are we now? [PDF]

open access: yesForced Migration Review, 1999
In recent years, concern for the security of aid personnel working in violent environments has grown rapidly.
Koenraad Van Brabant
doaj  

Home - About - Disclaimer - Privacy