Results 241 to 250 of about 7,372,576 (288)
Some of the next articles are maybe not open access.

Modeling and Verifying Security Policies in Business Processes

BMMDS/EMMSAD, 2014
Mattia Salnitri, F. Dalpiaz, P. Giorgini
semanticscholar   +1 more source

OpenSec: A framework for implementing security policies using OpenFlow

2014 IEEE Global Communications Conference, 2014
Adrián Lara, B. Ramamurthy
semanticscholar   +1 more source

Automata-based approach to design and analyze security policies

2014 Twelfth Annual International Conference on Privacy, Security and Trust, 2014
Wadie Krombi, M. Erradi, A. Khoumsi
semanticscholar   +1 more source

Nano-enabled pesticides for sustainable agriculture and global food security

Nature Nanotechnology, 2022
Deng-jun Wang, Navid B Saleh, Kay T Ho
exaly  

Circularly polarized lanthanide luminescence for advanced security inks

Nature Reviews Chemistry, 2020
Lewis Edward MacKenzie, Robert Pal
exaly  

A Survey on Security Aspects for 3GPP 5G Networks

IEEE Communications Surveys and Tutorials, 2020
Jin Cao, Maod, Hui Li
exaly  

Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation

Journal of computing and security, 2013
Piotr (Peter) Mardziel   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy