Results 31 to 40 of about 8,813,848 (351)
Security training: where are we now? [PDF]
In recent years, concern for the security of aid personnel working in violent environments has grown rapidly.
Koenraad Van Brabant
doaj
Aspects of Heat Supply Security Management Using Elements of Decision Theory
Security in heat supply systems plays an important role in social, technical and political terms. It includes three main components: energy security, security of heat supply, security of people.
Bożena Babiarz
doaj +1 more source
Organizational practices as antecedents of the information security management performance
Purpose The purpose of this paper is to expand current knowledge about the security organizational practices and analyze its effects on the information security management performance.
Daniel Perez González+2 more
semanticscholar +1 more source
Security Management Technology of Multilayer Satellite Internet Based on Blockchain
Satellite internet have the advantages of wide coverage, low latency, large transmission capacity and no geographical infl uence.It can provide ubiquitous internet access services for users all over the world.However, the heterogeneity of satellite ...
Ruijie ZHU+3 more
doaj
Burnable Pseudo-Identity: A Non-Binding Anonymous Identity Method for Ethereum
The concept of identity has become one common research topic in security and privacy where the real identity of users must be preserved, usually covered by pseudonym identifiers.
Ivan Gutierrez-Aguero+4 more
doaj +1 more source
The state defence system in the structure of managing internal security systems in Poland
The article focuses on the analysis of the defence structure of the Republic of Poland, presenting three key elements: management, militaristic and non-military subsystems.
Katrzyna Cyrkun+3 more
doaj +1 more source
What are the ethical pitfalls of countering hybrid warfare? This article proposes an ontological security-inspired reading of the EU and NATO’s engagement with hybrid threats.
M. Mälksoo
semanticscholar +1 more source
Analyzing the delays of target lane vehicles caused by vehicle lane-changing operation
Vehicle lane-changing on urban roads is the most common traffic behavior, in which the driver changes the direction or increases the speed of the vehicle by changing its trajectory.
Quantao Yang+4 more
doaj +1 more source
Integrated Security Management System for Enterprises in Industry 4.0
This paper presents results from the analysis of methodologies and standards aiming to meet the requirements to security management of enterprises implementing Industry 4.0 principles.
S. Dotsenko+3 more
semanticscholar +1 more source
Blockchain for Healthcare Management Systems: A Survey on Interoperability and Security
n recent years it has been shown that the secure exchange of medical information significantly benefits people’s life quality, improving their care and treatment.
E. Villarreal+3 more
semanticscholar +1 more source