Results 241 to 250 of about 7,372,576 (288)
Some of the next articles are maybe not open access.
Modeling and Verifying Security Policies in Business Processes
BMMDS/EMMSAD, 2014Mattia Salnitri, F. Dalpiaz, P. Giorgini
semanticscholar +1 more source
OpenSec: A framework for implementing security policies using OpenFlow
2014 IEEE Global Communications Conference, 2014Adrián Lara, B. Ramamurthy
semanticscholar +1 more source
Automata-based approach to design and analyze security policies
2014 Twelfth Annual International Conference on Privacy, Security and Trust, 2014Wadie Krombi, M. Erradi, A. Khoumsi
semanticscholar +1 more source
Nano-enabled pesticides for sustainable agriculture and global food security
Nature Nanotechnology, 2022Deng-jun Wang, Navid B Saleh, Kay T Ho
exaly
Circularly polarized lanthanide luminescence for advanced security inks
Nature Reviews Chemistry, 2020Lewis Edward MacKenzie, Robert Pal
exaly
A Survey on Security Aspects for 3GPP 5G Networks
IEEE Communications Surveys and Tutorials, 2020Jin Cao, Maod, Hui Li
exaly
Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation
Journal of computing and security, 2013Piotr (Peter) Mardziel +3 more
semanticscholar +1 more source

