Results 41 to 50 of about 271,319 (208)

Safety Risks Assessment and Security Evaluation of Manufacturing Entities

open access: yesScientific Bulletin, 2016
The article deals with security as a scientific discipline dealing with the assessment of the technical condition of machineries, hazards identification and risks assessment which could lead to fatal consequences.
Kováčová Lucia   +4 more
doaj   +1 more source

Design of Vulnerability Ontologies and Application of Logical Inference for Security Information and Events Menegement

open access: yesБезопасность информационных технологий, 2013
In the paper the usage of the ontological approach, description logics and logical inference to the design of the data model of computer vulnerabilities and attacks is suggested.
Olga Vitalievna Polubelova   +1 more
doaj  

ICT Security Management

open access: yes, 2007
Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution.
Schreurs, Jeanne, Moreau, Rachel
openaire   +4 more sources

Integrated Management of Security Policies [PDF]

open access: yes, 2011
The design of an integrated approach for security management represents a difficult challenge, but the requirements of modern information systems make extremely urgent to dedicate research efforts in this direction. Three perspectives for integration can be identified.
openaire   +4 more sources

An Autonomous Deployment Mechanism for AI Security Services

open access: yesIEEE Access
Future network architectures are expected to be autonomous, intelligent, and service-based, posing new security challenges. To address these challenges, the Artificial Intelligence (AI) security service emerges as a promising solution.
Weilin Wang   +3 more
doaj   +1 more source

Predicting Exploitations of Information Systems Vulnerabilities Through Attackers’ Characteristics

open access: yesIEEE Access, 2017
The main goal of proactive security is to prevent attacks before they happen. In modern information systems it largely depends on the vulnerability management process, where prioritization is one of the key steps.
Andrej Dobrovoljc   +2 more
doaj   +1 more source

Integrated security management model: a proposal applied to organisational resilience. [PDF]

open access: yesSecur J, 2023
Marquez-Tejon J   +2 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy