Results 11 to 20 of about 2,547,954 (246)

Legal interpretation of modern security risks [PDF]

open access: yesOditor, 2023
With globalization, we have a pronounced paradigm of a risky society. That paradigm arises due to the uncontrolled production of socioeconomic, environmental and military risks.
Bardžić Žikica   +1 more
doaj  

New Approaches to the Analysis of the Security Environment and their Importance for Security Management

open access: yesCommunications, 2015
Examination of security environment in many security papers and studies is focused primarily on analysis of external security environment of different countries.
Ladislav Hofreiter   +4 more
doaj   +1 more source

A trustworthy mobile agent infrastructure for network management [PDF]

open access: yes, 2007
Despite several advantages inherent in mobile-agent-based approaches to network management as compared to traditional SNMP-based approaches, industry is reluctant to adopt the mobile agent paradigm as a replacement for the existing manager-agent model ...
Koliousis, A., Sventek, J.S.
core   +1 more source

Assessment of the Impact of Information Security Awareness Training Methods on Knowledge, Attitude, and Behavior

open access: yesIEEE Access, 2022
Technology is changing the way we work more than ever before. Therefore, it is critical to understand the security threats associated with these advanced tools to protect systems and data.
Bader Alkhazi   +3 more
doaj   +1 more source

Distributed Reputation Management for Secure and Efficient Vehicular Edge Computing and Networks

open access: yesIEEE Access, 2017
Vehicular edge computing (VEC) is introduced to extend computing capacity to vehicular network edge recently. With the advent of VEC, service providers directly host services in close proximity of mobile vehicles for great improvements.
Xumin Huang   +3 more
doaj   +1 more source

Security dialogues: building better relationships between security and business [PDF]

open access: yes, 2016
In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes.
Ashenden, Debi, Lawrence, Darren
core   +1 more source

Security Management Technology of Multilayer Satellite Internet Based on Blockchain

open access: yes天地一体化信息网络, 2022
Satellite internet have the advantages of wide coverage, low latency, large transmission capacity and no geographical infl uence.It can provide ubiquitous internet access services for users all over the world.However, the heterogeneity of satellite ...
Ruijie ZHU   +3 more
doaj  

Security risk assessment and protection in the chemical and process industry [PDF]

open access: yes, 2014
This article describes a security risk assessment and protection methodology that was developed for use in the chemical- and process industry in Belgium. The approach of the method follows a risk-based approach that follows desing principles for chemical
American Petroleum Institute   +19 more
core   +1 more source

Security training: where are we now? [PDF]

open access: yesForced Migration Review, 1999
In recent years, concern for the security of aid personnel working in violent environments has grown rapidly.
Koenraad Van Brabant
doaj  

Is Your Android App Insecure? Patching Security Functions With Dynamic Policy Based on a Java Reflection Technique

open access: yesIEEE Access, 2020
With the popularization of smart devices, companies are adopting bring-your-own-device or mobile office policies that utilize personal smart devices for work.
Sung-Hoon Lee   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy