Results 71 to 80 of about 8,813,848 (351)
Cyber Security Management Model for Critical Infrastructure
Cyber security is the most critical aspect nowadays of our technologically based lives. Government institutions, banking sectors, public and private services, nuclear power plants, power grid operators, water suppliers or waste water treatment companies ...
Tadas Limba+3 more
semanticscholar +1 more source
Financial institutions security on the business services market
The system of guaranteeing the financial institutions security has been improved. Security management of a financial institution is the influence of management on the institution's activities in order to ensure security - such a state of the institution ...
Andrii Faliuta+2 more
doaj +1 more source
Tin‐Based 2D/3D Perovskite Vertical Heterojunction for High‐Performance Synaptic Phototransistors
Phototransistors based on tin‐based 2D/3D perovskite heterostructures show an ultrahigh responsivity and detectivity at a low gate voltage across a broad wavelength region from ultraviolet to near‐infrared. The devices can replicate neuromorphic learning and remembering behaviors to light stimuli, in addition to electric depression and memory erasure ...
Hok‐Leung Loi+10 more
wiley +1 more source
Continuous Quantitative Risk Management in Smart Grids Using Attack Defense Trees
Although the risk assessment discipline has been studied from long ago as a means to support security investment decision-making, no holistic approach exists to continuously and quantitatively analyze cyber risks in scenarios where attacks and defenses ...
Erkuden Rios+4 more
doaj +1 more source
Multi‐Scaled Cellulosic Nanonetworks from Tunicates
Microbial and plant nanonetworks of cellulose have enabled a wide range of high‐performance yet sustainable materials. Herein, a third class of cellulosic nanonetworks is showcased by exploiting the only animal tissue‐producing cellulose nanofibers, i.e., ascidians. An ultrastructure including spherical cells and a microvasculature with diameters of 50–
Mano Govindharaj+10 more
wiley +1 more source
An Empirical Study of Information Security Management Success Factors
Information security management (ISM) is a continuous, structured and systematic security approach to manage and protect the organisation’s information from being compromised by irresponsible parties.
Mazlina Zammani, R. Razali
semanticscholar +1 more source
Carbon Nanotube 3D Integrated Circuits: From Design to Applications
As Moore's law approaches its physical limits, carbon nanotube (CNT) 3D integrated circuits (ICs) emerge as a promising alternative due to the miniaturization, high mobility, and low power consumption. CNT 3D ICs in optoelectronics, memory, and monolithic ICs are reviewed while addressing challenges in fabrication, design, and integration.
Han‐Yang Liu+3 more
wiley +1 more source
Global Tourism and Terrorism. Safety and Security Management
In the last two years, some Mediterranean regions have obtained significant benefits from the contraction of large tourist investments marking contrasting trends, as in the case of Sardinia and other Italian and Spanish sub-regions (conceivably due to ...
S. Brondoni
semanticscholar +1 more source
Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution.
Schreurs, Jeanne, Moreau, Rachel
openaire +4 more sources
An Autonomous Deployment Mechanism for AI Security Services
Future network architectures are expected to be autonomous, intelligent, and service-based, posing new security challenges. To address these challenges, the Artificial Intelligence (AI) security service emerges as a promising solution.
Weilin Wang+3 more
doaj +1 more source