Results 321 to 330 of about 2,285,782 (354)
Some of the next articles are maybe not open access.

German Security Policy

1999
Conclusions * The Bundeswehr, a modern, professional, well-trained force of some 340,000 troops, is at the end of a restructuring process which started in 1992. This restructuring was accomplished even as Germany's armed forces successfully contributed to international peace operations.
openaire   +1 more source

Security Policies and Procedures

2009
The number and severity of attacks on computer and information systems in the last two decades has steadily risen and mandates the use of security policies by organizations to protect digital as well as physical assets. Although the adoption and implementation of such policies still falls far short, progress is being made.
openaire   +1 more source

Security, Privacy, and Policy Roundup

IEEE Security & Privacy, 2012
■ Scientists from the ca’ Foscari University of Venice, the University of Birmingham, Google, and the Norwegian University of Science and Technology designed a cyberattack that took only 13 minutes to steal the keys from RSA’s SecurID 800 token fob. They say their exploit could also compromise additional devices that store RSA keys, including other ...
openaire   +3 more sources

Interactive simulation of security policies

Proceedings of the 2002 ACM symposium on Applied computing, 2002
A general framework for simulating security policies interactively is developed by ASMs (Gurevich's Abstract State Machines) and then mechanised by the ASM Workbench. The ASM external functions make it possible to simulate under the environmental influence the behaviour of a policy.
openaire   +3 more sources

Wireless security policies

Network Security, 2003
Security policies: The phrase that strikes fear in the hearts of many security professionals. Policy and policy enforcement is a critical part of any organization's security posture. Unfortunately, many administrators find policy mundane or frustrating. When it comes to wireless security, a clear and complete policy is even more critical.
openaire   +2 more sources

ICT Security Policy

2011
Computer crime is now becoming a major international problem, with continual increases in incidents of cracking, hacking, viruses, worms, bacteria and the like having been reported in recent years. As a result of this massive vulnerabilities and new intrusion techniques, the rate of computer crime has accelerated beyond imagination.
openaire   +1 more source

Security policy

2002
Publisher Summary The importance of a meaningful security policy cannot be overemphasized. Establishing a security policy is the starting point in designing a secure computer network. It is essential that a set of minimum security requirements be gathered, formalized and included as the basis of the security policy.
openaire   +2 more sources

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges

IEEE Communications Surveys and Tutorials, 2021
Bo-chao Cheng   +2 more
exaly  

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security

IEEE Communications Surveys and Tutorials, 2020
Abdulla Al-ali, Amr Mohamed, Ihsan Ali
exaly  

A Survey on Space-Air-Ground-Sea Integrated Network Security in 6G

IEEE Communications Surveys and Tutorials, 2022
Hongzhi Guo, Jingyi Li, Jiajia Liu
exaly  

Home - About - Disclaimer - Privacy