Results 81 to 90 of about 2,352,522 (144)

Audit for Information Systems Security [PDF]

open access: yes
The information and communication technologies advances made available enormous and vast amounts of information. This availability generates also significant risks to computer systems, information and to the critical operations and infrastructures they ...
Ana-Maria SUDUC   +2 more
core  

Application-centric congestion control

open access: yesEURASIP Journal on Wireless Communications and Networking
Modern networked applications typically establish multiple connections to one or more servers to ensure that the virtual objects with which the user interacts are kept up to date.
Danny De Vleeschauwer   +3 more
doaj   +1 more source

Challenges of formal social security systems in Sudan [PDF]

open access: yes
The present paper discusses issues of challenges of social security systems in Sudan. Following parameters advanced by ILO and UNCOSOC, those systems are analyzed.
Mohamed, Issam A.W.
core   +1 more source

Towards a Layered Architectural View for Security Analysis in SCADA Systems

open access: yes, 2012
Supervisory Control and Data Acquisition (SCADA) systems support and control the operation of many critical infrastructures that our society depend on, such as power grids. Since SCADA systems become a target for cyber attacks and the potential impact of
Ma, Zhendong   +2 more
core  

Multimodal Location Spoofing: Federated Detection With RAIM-Based Self-Labeling

open access: yesIEEE Open Journal of the Communications Society
Modern localization relies on satellite and terrestrial infrastructures (e.g., global navigation satellite system (GNSS) and crowd-sourced Wi-Fi), supporting critical applications ranging from autonomous navigation to life services.
Wenjie Liu, Panos Papadimitratos
doaj   +1 more source

System security and information security of Armeniancy

open access: yes21st Century, 2008
The paper deals with some aspects of Armeniancy in the domain of its system andinformation security. An attempt has been made to classify and assess the challengestargeting Armenia, as well as to uncover the opportunities resulting fromthose challenges.
openaire   +1 more source

Coordinated Position Falsification Attacks and Countermeasures for Location-Based Services

open access: yesIEEE Open Journal of the Communications Society
With the rise of applications that rely on terrestrial and satellite infrastructures (e.g., and crowd-sourced Wi-Fi, Bluetooth, cellular, and IP databases) for positioning, ensuring their integrity and security is paramount.
Wenjie Liu, Panos Papadimitratos
doaj   +1 more source

Design Of Integration Security System Using Xml Security

open access: yes, 2007
{"references": ["W3C, XML Key Management (XKMS 2.0) Requirements, May-2003.", "W3C, XML Key Management Specification Version 2.0, Apr-2003.", "OASIS, eXtensible Access Control Markup Language (XACML) Version\n1.0, Feb-2003.", "OASIS, A Brief Introduction to XACML, Feb-2003.", "OASIS, Security Assertion Markup Language, Jan-2003.", "OASIS, Web Services ...
Kim, Juhan, Soohyung Kim, Kiyoung Moon
openaire   +1 more source

The Convergence of Blockchain, NFTs, and Deepfake in Mental Health Therapy: A Systematic Literature Review

open access: yesIEEE Access
Digital mental health interventions increasingly require robust security frameworks, authenticated content delivery, and personalized therapeutic experiences.
Btissam Acim   +3 more
doaj   +1 more source

INVESTIGATION OF CHANGES IN THE LEVEL OF NETWORK SECURITY BASED ON A COGNITIVE APPROACH

open access: yesInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska
A study was conducted on the impact of the most significant threats on the level of network security based on the examination of impulse processes on a fuzzy cognitive map.
Olha Saliieva, Yurii Yaremchuk
doaj   +1 more source

Home - About - Disclaimer - Privacy