Results 21 to 30 of about 271,319 (208)

Security training: where are we now? [PDF]

open access: yesForced Migration Review, 1999
In recent years, concern for the security of aid personnel working in violent environments has grown rapidly.
Koenraad Van Brabant
doaj  

Security Management Technology of Multilayer Satellite Internet Based on Blockchain

open access: yes天地一体化信息网络, 2022
Satellite internet have the advantages of wide coverage, low latency, large transmission capacity and no geographical infl uence.It can provide ubiquitous internet access services for users all over the world.However, the heterogeneity of satellite ...
Ruijie ZHU   +3 more
doaj  

New Approaches to the Analysis of the Security Environment and their Importance for Security Management

open access: yesCommunications, 2015
Examination of security environment in many security papers and studies is focused primarily on analysis of external security environment of different countries.
Ladislav Hofreiter   +4 more
doaj   +1 more source

Is Your Android App Insecure? Patching Security Functions With Dynamic Policy Based on a Java Reflection Technique

open access: yesIEEE Access, 2020
With the popularization of smart devices, companies are adopting bring-your-own-device or mobile office policies that utilize personal smart devices for work.
Sung-Hoon Lee   +4 more
doaj   +1 more source

DISINTEGRATION OF GLOBAL SECURITY GOVERNANCE

open access: yesRevista Tempo do Mundo, 2020
Since World War II, with global breakdowns and new world orders, one of the topics that have constantly worried several countries is global security. As countries have evolved and modernized over time, due to globalization, the international system has ...
Victoria Panova, Georgy Toloraya
doaj   +1 more source

Categorizing Security for Security Management and Information Resource Management

open access: yesJournal of Strategic Security, 2019
There are various definitions and dimensions of security, and there is no comprehensive taxonomy of security. The existing classifications of security are fragmented, scattered, and divergent, binging challenges in the management of security and the management of information resources about security. This research aims to study the problems of security
Wu, Yejun, Meng, Fansong
openaire   +4 more sources

ICAO AVIATION OCCURRENCE CATEGORIES SIGNIFICANTLY AFFECTING AVIATION SAFETY IN POLAND FROM 2008 TO 2015 [PDF]

open access: yesScientific Journal of Silesian University of Technology. Series Transport, 2017
Poland, as a member of the EU, is represented within the ICAO, by the European Aviation Safety Agency. However, this does not relieve our country from the responsibility of developing a state safety programme (SSP).
Paweł GŁOWACKI, Włodzimierz BALICKI
doaj   +1 more source

A User-Centric Perspective of 6G Networks: A Survey

open access: yesIEEE Access
6G currently stands at the forefront of wireless communications research, offering numerous enhancements over previous generations. New key performance indicators (KPIs) have been defined, including microsecond-level latency and increased data ...
Stamatia F. Drampalou   +4 more
doaj   +1 more source

Evaluation of Threats Occurring During Provision of Road Transport Services in the EU Territory by Small and Medium-Sized Companies from Poland [PDF]

open access: yesZeszyty Naukowe Wyższej Szkoły Finansów i Prawa w Bielsku-Białej, 2019
The aim of the paper is to conduct an analysis of various threats that may occur during road freight transport in the territory of the European Union. The research method consisted of a survey and the sample group selected for the survey were transport ...
Marek Krzywonos
doaj   +1 more source

IoT Security-Quality-Metrics Method and Its Conformity with Emerging Guidelines

open access: yesIoT, 2021
This study proposes a security-quality-metrics method tailored for the Internet of things (IoT) and evaluates conformity of the proposed approach with pertinent cybersecurity regulations and guidelines for IoT.
Kosuke Ito   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy