Results 81 to 90 of about 2,352,522 (144)
Audit for Information Systems Security [PDF]
The information and communication technologies advances made available enormous and vast amounts of information. This availability generates also significant risks to computer systems, information and to the critical operations and infrastructures they ...
Ana-Maria SUDUC +2 more
core
Application-centric congestion control
Modern networked applications typically establish multiple connections to one or more servers to ensure that the virtual objects with which the user interacts are kept up to date.
Danny De Vleeschauwer +3 more
doaj +1 more source
Challenges of formal social security systems in Sudan [PDF]
The present paper discusses issues of challenges of social security systems in Sudan. Following parameters advanced by ILO and UNCOSOC, those systems are analyzed.
Mohamed, Issam A.W.
core +1 more source
Towards a Layered Architectural View for Security Analysis in SCADA Systems
Supervisory Control and Data Acquisition (SCADA) systems support and control the operation of many critical infrastructures that our society depend on, such as power grids. Since SCADA systems become a target for cyber attacks and the potential impact of
Ma, Zhendong +2 more
core
Multimodal Location Spoofing: Federated Detection With RAIM-Based Self-Labeling
Modern localization relies on satellite and terrestrial infrastructures (e.g., global navigation satellite system (GNSS) and crowd-sourced Wi-Fi), supporting critical applications ranging from autonomous navigation to life services.
Wenjie Liu, Panos Papadimitratos
doaj +1 more source
System security and information security of Armeniancy
The paper deals with some aspects of Armeniancy in the domain of its system andinformation security. An attempt has been made to classify and assess the challengestargeting Armenia, as well as to uncover the opportunities resulting fromthose challenges.
openaire +1 more source
Coordinated Position Falsification Attacks and Countermeasures for Location-Based Services
With the rise of applications that rely on terrestrial and satellite infrastructures (e.g., and crowd-sourced Wi-Fi, Bluetooth, cellular, and IP databases) for positioning, ensuring their integrity and security is paramount.
Wenjie Liu, Panos Papadimitratos
doaj +1 more source
Design Of Integration Security System Using Xml Security
{"references": ["W3C, XML Key Management (XKMS 2.0) Requirements, May-2003.", "W3C, XML Key Management Specification Version 2.0, Apr-2003.", "OASIS, eXtensible Access Control Markup Language (XACML) Version\n1.0, Feb-2003.", "OASIS, A Brief Introduction to XACML, Feb-2003.", "OASIS, Security Assertion Markup Language, Jan-2003.", "OASIS, Web Services ...
Kim, Juhan, Soohyung Kim, Kiyoung Moon
openaire +1 more source
Digital mental health interventions increasingly require robust security frameworks, authenticated content delivery, and personalized therapeutic experiences.
Btissam Acim +3 more
doaj +1 more source
INVESTIGATION OF CHANGES IN THE LEVEL OF NETWORK SECURITY BASED ON A COGNITIVE APPROACH
A study was conducted on the impact of the most significant threats on the level of network security based on the examination of impulse processes on a fuzzy cognitive map.
Olha Saliieva, Yurii Yaremchuk
doaj +1 more source

