Results 21 to 30 of about 2,547,954 (246)
DISINTEGRATION OF GLOBAL SECURITY GOVERNANCE
Since World War II, with global breakdowns and new world orders, one of the topics that have constantly worried several countries is global security. As countries have evolved and modernized over time, due to globalization, the international system has ...
Victoria Panova, Georgy Toloraya
doaj +1 more source
Shinren : Non-monotonic trust management for distributed systems [PDF]
The open and dynamic nature of modern distributed systems and pervasive environments presents significant challenges to security management. One solution may be trust management which utilises the notion of trust in order to specify and interpret security
Dong, Changyu, Dulay, Naranker
core +4 more sources
On Secure Workflow Decentralisation on the Internet [PDF]
Decentralised workflow management systems are a new research area, where most work to-date has focused on the system's overall architecture. As little attention has been given to the security aspects in such systems, we follow a security driven approach,
Adi Shamir +28 more
core +3 more sources
The conducted field studies made it possible to determine the degree of COVID-19 pandemic influence on the enterprises’ activities in the East Kazakhstan region, and found out the opinion of employers about the forms of state support for maintaining ...
G. B. Pestunova, E. A. Vechkinzova
doaj +1 more source
Security and Privacy Issues in Wireless Mesh Networks: A Survey
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta +73 more
core +1 more source
Reconfigurable Security: Edge Computing-based Framework for IoT
In various scenarios, achieving security between IoT devices is challenging since the devices may have different dedicated communication standards, resource constraints as well as various applications.
Chen, Jyh-Cheng +3 more
core +1 more source
Evaluation of Threats Occurring During Provision of Road Transport Services in the EU Territory by Small and Medium-Sized Companies from Poland [PDF]
The aim of the paper is to conduct an analysis of various threats that may occur during road freight transport in the territory of the European Union. The research method consisted of a survey and the sample group selected for the survey were transport ...
Marek Krzywonos
doaj +1 more source
Introduction to Security Onion [PDF]
Security Onion is a Network Security Manager (NSM) platform that provides multiple Intrusion Detection Systems (IDS) including Host IDS (HIDS) and Network IDS (NIDS). Many types of data can be acquired using Security Onion for analysis.
Heenan, Ross, Moradpoor, Naghmeh
core
Liquid biopsy enables minimally invasive, real‐time molecular profiling through analysis of circulating biomarkers in biological fluids. This Perspective highlights the importance of training pathologists through integrative educational programs, such as the European Masters in Molecular Pathology, to ensure effective and equitable implementation of ...
Marius Ilié +13 more
wiley +1 more source
ICAO AVIATION OCCURRENCE CATEGORIES SIGNIFICANTLY AFFECTING AVIATION SAFETY IN POLAND FROM 2008 TO 2015 [PDF]
Poland, as a member of the EU, is represented within the ICAO, by the European Aviation Safety Agency. However, this does not relieve our country from the responsibility of developing a state safety programme (SSP).
Paweł GŁOWACKI, Włodzimierz BALICKI
doaj +1 more source

