Results 71 to 80 of about 2,547,954 (246)

Design of Vulnerability Ontologies and Application of Logical Inference for Security Information and Events Menegement

open access: yesБезопасность информационных технологий, 2013
In the paper the usage of the ontological approach, description logics and logical inference to the design of the data model of computer vulnerabilities and attacks is suggested.
Olga Vitalievna Polubelova   +1 more
doaj  

ORACLE DATABASE SECURITY [PDF]

open access: yes
This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development.
Cristina-Maria Titrade
core  

Safety Risks Assessment and Security Evaluation of Manufacturing Entities

open access: yesBuletinul Ştiinţific al Academiei Trupelor de Uscat, 2016
The article deals with security as a scientific discipline dealing with the assessment of the technical condition of machineries, hazards identification and risks assessment which could lead to fatal consequences.
Kováčová Lucia   +4 more
doaj   +1 more source

Does Long‐Term Lower Extremity Strength Training in Adults With Knee Osteoarthritis and Varus Alignment Reduce Knee Joint Loading During Gait?

open access: yesArthritis Care &Research, EarlyView.
Objective We examined whether 18 months of strength training in individuals with knee varus alignment and medial tibiofemoral osteoarthritis (OA) reduced knee joint loads during walking compared to an attention control group. Methods This study was a secondary analysis of a randomized clinical trial that compared the effects of strength training to a ...
Stephen P. Messier   +12 more
wiley   +1 more source

Prevalence of Systemic Lupus Erythematosus in Australia, 2010–2022: A Population‐Based Study Using Linked National Administrative Health Data

open access: yesArthritis Care &Research, Accepted Article.
Objectives Systemic lupus erythematosus (SLE) is a heterogenous inflammatory condition, with widely varying global prevalence estimates. Frequency of SLE in the general population of Australia has been reported to be notably lower than contemporary estimates in countries such as the US or UK at 19‐39 per 100,000 as opposed to 65‐97 per 100,000.
Lucinda Roper   +7 more
wiley   +1 more source

An analysis of security issues in building automation systems [PDF]

open access: yes, 2014
The purpose of Building Automation Systems (BAS) is to centralise the management of a wide range of building services, through the use of integrated protocol and communication media.
Johnstone, Michael N, Peacock, Matthew D
core   +2 more sources

Critical Infrastructure in the National Security System

open access: yesSafety & Fire Technology, 2019
Aim: To present relationships resulting from legal regulations impacting the effectiveness of critical infrastructure protection, which is a part of the national security system.
Bogdan Kosowski
doaj   +1 more source

An examination into the role of knowledge management and computer security in organizations [PDF]

open access: yes, 2005
Organisations develop their computer security procedures based on external guidelines such as ISO 17799 with very little provision to incorporate organisational knowledge in their security procedures.
Gururajan, Raj, Gururajan, Vijaya
core  

A Concept of a Digital and Traceable Manufacturing Documentation Based on Formalized Process Description Applied on Composite Aircraft Moveable

open access: yesAdvanced Engineering Materials, EarlyView.
The documentation of component manufacture has become an essential part of today's production processes, especially for the analysis and optimization of production or component design with regard to structural performance, economic efficiency, and sustainability.
Björn Denker   +4 more
wiley   +1 more source

The role of safety analysis in the safety protection and management system [PDF]

open access: yesKošická bezpečnostná revue
The aim of this paper is to analyze the significance and role of security policy and security projects in the process of organizational security management.
Ivan PEZLAR
doaj  

Home - About - Disclaimer - Privacy