The Management of the Security Information
With the time advancement and the development of information technologies, the process of managing security information is present in most of the actions carried out at the level of state institutions, national economy, business, service provision, etc.
CREANGĂ, Liliana, BUZEV, Anatoli
openaire +1 more source
Critical Infrastructure in the National Security System
Aim: To present relationships resulting from legal regulations impacting the effectiveness of critical infrastructure protection, which is a part of the national security system.
Bogdan Kosowski
doaj +1 more source
Enterprise Information Security Management Using Internet of Things Combined with Artificial Intelligence Technology. [PDF]
Sun H, Bai S.
europepmc +1 more source
Key management and the security of management in open systems: the SAMSON prototype. [PDF]
György Endersz, R. Zamparo
openalex +1 more source
Networked Organizational Structure of Enterprise Information Security Management Based on Digital Transformation and Genetic Algorithm. [PDF]
Di Z, Liu Y, Li S.
europepmc +1 more source
Two-Level Security Management and the Prospects for New Democracies: A Simulation Analysis [PDF]
Marc V. Simon, Harvey Starr
openalex +1 more source
Observations on the role life-cycle in the context of enterprise security management [PDF]
Axel Kern +3 more
openalex +2 more sources
Models of Epidemiological Security Management in the Spread of the SARS-CoV-2 Virus. [PDF]
Kereselidze N.
europepmc +1 more source
Management of schizophrenia in conditions of high security [PDF]
Lindsay Thomson
openalex +1 more source
A Security Management and Control Solution of Smart Park Based on Sensor Networks. [PDF]
Zhao Y +5 more
europepmc +1 more source

