Results 1 to 10 of about 6,779,765 (359)
Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks. [PDF]
For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the ...
Lin Z, Tao D, Wang Z.
europepmc +2 more sources
Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems. [PDF]
Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT) to the cloud,
Wu J, Su Z, Wang S, Li J.
europepmc +2 more sources
Denial of information to the officer of the communal militia, police and security services: Between punishment and non-punishment [PDF]
The paper is dealing with authorities of the comunal militia, police and security services to collect information from citizens and legal persons. While the authorities of police and security services are based on willingness of giving information, at ...
Milosavljević Bogoljub
doaj +1 more source
Recent evolution of the industrial Internet of Things empowers the classical manufacturing model with cloud computing integration for Industry 4.0. Cloud integration advances the capabilities of manufacturing systems with cloud-based controlling and real-
T. Hewa+3 more
semanticscholar +1 more source
Choosing the optimal network security service provider (NSSP) is a very important part of enterprise management decision. And the choice of NSSP is a typical multiple attribute group decision making (MAGDM) issue.
Mengwei Zhao+4 more
semanticscholar +1 more source
Cloud Security Service for Identifying Unauthorized User Behaviour
: Recently, an innovative trend like cloud computing has progressed quickly in InformationTechnology. For a background of distributed networks, the extensive sprawl of internet resources on the Web and the increasing number of service providers helped ...
D. Stalin David+6 more
semanticscholar +1 more source
Introduction Understanding the effectiveness and durability of protection against SARS-CoV-2 infection conferred by previous infection and COVID-19 is essential to inform ongoing management of the pandemic. This study aims to determine whether prior SARS-
Nick Andrews+21 more
doaj +1 more source
Network security is a very important issue in recent years. For many new or traditional enterprises, utilizing internet to store and analyze data has become an indivisible part of their production and operation.
Mengwei Zhao+3 more
semanticscholar +1 more source
A Dynamic Deployment Method of Security Services Based on Malicious Behavior Knowledge Base
In view of various security requirements, there are various security services in the network. In particular, DDoS attacks have various types and detection methods. How to flexibly combine security services and make full use of the information provided by
Qi Guo, Man Li, Weilin Wang, Ying Liu
doaj +1 more source
BIBLICAL IMAGES-SYMBOLS IN FRANK PERETTI’S MYSTICAL THRILLERS: LINGUAL REPRESENTATION AND PRAGMATIC VALUE [PDF]
The paper aims to clarify the biblical image-symbols in Frank Peretti’s mystical thrillers. The problem of the detailed analysis of the lingual representation of the biblical image-symbols and their pragmatic value is solved in the article by applying ...
Polina S. Khabotniakova+1 more
doaj +1 more source