Results 21 to 30 of about 2,517,406 (276)
Security Management Technology of Multilayer Satellite Internet Based on Blockchain
Satellite internet have the advantages of wide coverage, low latency, large transmission capacity and no geographical infl uence.It can provide ubiquitous internet access services for users all over the world.However, the heterogeneity of satellite ...
Ruijie ZHU +3 more
doaj
Security risk assessment and protection in the chemical and process industry [PDF]
This article describes a security risk assessment and protection methodology that was developed for use in the chemical- and process industry in Belgium. The approach of the method follows a risk-based approach that follows desing principles for chemical
American Petroleum Institute +19 more
core +1 more source
With the popularization of smart devices, companies are adopting bring-your-own-device or mobile office policies that utilize personal smart devices for work.
Sung-Hoon Lee +4 more
doaj +1 more source
DISINTEGRATION OF GLOBAL SECURITY GOVERNANCE
Since World War II, with global breakdowns and new world orders, one of the topics that have constantly worried several countries is global security. As countries have evolved and modernized over time, due to globalization, the international system has ...
Victoria Panova, Georgy Toloraya
doaj +1 more source
Shinren : Non-monotonic trust management for distributed systems [PDF]
The open and dynamic nature of modern distributed systems and pervasive environments presents significant challenges to security management. One solution may be trust management which utilises the notion of trust in order to specify and interpret security
Dong, Changyu, Dulay, Naranker
core +4 more sources
Reconfigurable Security: Edge Computing-based Framework for IoT
In various scenarios, achieving security between IoT devices is challenging since the devices may have different dedicated communication standards, resource constraints as well as various applications.
Chen, Jyh-Cheng +3 more
core +1 more source
On Secure Workflow Decentralisation on the Internet [PDF]
Decentralised workflow management systems are a new research area, where most work to-date has focused on the system's overall architecture. As little attention has been given to the security aspects in such systems, we follow a security driven approach,
Adi Shamir +28 more
core +3 more sources
ICAO AVIATION OCCURRENCE CATEGORIES SIGNIFICANTLY AFFECTING AVIATION SAFETY IN POLAND FROM 2008 TO 2015 [PDF]
Poland, as a member of the EU, is represented within the ICAO, by the European Aviation Safety Agency. However, this does not relieve our country from the responsibility of developing a state safety programme (SSP).
Paweł GŁOWACKI, Włodzimierz BALICKI
doaj +1 more source
A User-Centric Perspective of 6G Networks: A Survey
6G currently stands at the forefront of wireless communications research, offering numerous enhancements over previous generations. New key performance indicators (KPIs) have been defined, including microsecond-level latency and increased data ...
Stamatia F. Drampalou +4 more
doaj +1 more source
Introduction to Security Onion [PDF]
Security Onion is a Network Security Manager (NSM) platform that provides multiple Intrusion Detection Systems (IDS) including Host IDS (HIDS) and Network IDS (NIDS). Many types of data can be acquired using Security Onion for analysis.
Heenan, Ross, Moradpoor, Naghmeh
core

