Results 1 to 10 of about 2,319,668 (347)
Today, it is hardly necessary to emphasize the fact particularly that the successful existence of the enterprise as an economic unit is no longer so self-evident as it has been in former years. The achievement of commensurate profits, maintaining the substance of business or in extreme cases even the survival of the enterprise : all these are being ...
Hans Braunschweiler
openalex +3 more sources
Quality of Security Service: Adaptive Security
Abstract : The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks. In this approach, the "level of service" must be within an acceptable range, and can indicate degrees of security with respect to
Timothy E. Levin +2 more
openalex +7 more sources
Assessing the security of VoIP Services [PDF]
VoIP networks are in a major deployment phase and are becoming widely spread out due to their extended functionality and cost efficiency. Meanwhile, as VoIP traffic is transported over the Internet, it is the target of a range of attacks that can jeopardize its proper functionality.
Humberto Abdelnur +3 more
openalex +5 more sources
A Dynamic Deployment Method of Security Services Based on Malicious Behavior Knowledge Base
In view of various security requirements, there are various security services in the network. In particular, DDoS attacks have various types and detection methods. How to flexibly combine security services and make full use of the information provided by
Qi Guo, Man Li, Weilin Wang, Ying Liu
doaj +1 more source
Introduction Understanding the effectiveness and durability of protection against SARS-CoV-2 infection conferred by previous infection and COVID-19 is essential to inform ongoing management of the pandemic. This study aims to determine whether prior SARS-
Nick Andrews +21 more
doaj +1 more source
Denial of information to the officer of the communal militia, police and security services: Between punishment and non-punishment [PDF]
The paper is dealing with authorities of the comunal militia, police and security services to collect information from citizens and legal persons. While the authorities of police and security services are based on willingness of giving information, at ...
Milosavljević Bogoljub
doaj +1 more source
Software as a service and security [PDF]
Nowadays, Cloud Computing is an important hi-tech research area in the most recent innovation. These advancements give clients a few benefits: cost-adequacy, effective asset usage, cooperation, catastrophe recuperation, and elite. Cloud offers administrations for processing on a solitary mouse click.
openaire +1 more source
In many countries where tuberculosis (TB) is endemic, the Bacillus Calmette–Guérin (BCG) vaccine is given as close to birth as possible to protect infants and children from severe forms of TB.
Charlotte Sarfas +9 more
doaj +1 more source
PredictDeep: Security Analytics as a Service for Anomaly Detection and Prediction
As businesses embrace digitization, the Internet of Everything (IoE) begins to take shape and the Cloud continues to empower new innovations for big data -at the heart, Cloud analytic applications gain increasing momentum.
Marwa A. Elsayed, Mohammad Zulkernine
doaj +1 more source
To keep its business reliable, Google is concerned to ensure the quality of apps on the store. One crucial aspect concerning quality is security. Security is achieved through Google Play protect and anti-malware solutions.
Franklin Tchakounté +3 more
doaj +1 more source

