Results 1 to 10 of about 6,779,765 (359)

Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks. [PDF]

open access: yesSensors (Basel), 2017
For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the ...
Lin Z, Tao D, Wang Z.
europepmc   +2 more sources

Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems. [PDF]

open access: yesSensors (Basel), 2017
Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT) to the cloud,
Wu J, Su Z, Wang S, Li J.
europepmc   +2 more sources

Denial of information to the officer of the communal militia, police and security services: Between punishment and non-punishment [PDF]

open access: yesPravni Zapisi, 2022
The paper is dealing with authorities of the comunal militia, police and security services to collect information from citizens and legal persons. While the authorities of police and security services are based on willingness of giving information, at ...
Milosavljević Bogoljub
doaj   +1 more source

Fog Computing and Blockchain-Based Security Service Architecture for 5G Industrial IoT-Enabled Cloud Manufacturing

open access: yesIEEE Transactions on Industrial Informatics, 2022
Recent evolution of the industrial Internet of Things empowers the classical manufacturing model with cloud computing integration for Industry 4.0. Cloud integration advances the capabilities of manufacturing systems with cloud-based controlling and real-
T. Hewa   +3 more
semanticscholar   +1 more source

MODEL FOR NETWORK SECURITY SERVICE PROVIDER SELECTION WITH PROBABILISTIC UNCERTAIN LINGUISTIC TODIM METHOD BASED ON PROSPECT THEORY

open access: yesTechnological and Economic Development of Economy, 2022
Choosing the optimal network security service provider (NSSP) is a very important part of enterprise management decision. And the choice of NSSP is a typical multiple attribute group decision making (MAGDM) issue.
Mengwei Zhao   +4 more
semanticscholar   +1 more source

Cloud Security Service for Identifying Unauthorized User Behaviour

open access: yesComputers Materials & Continua, 2022
: Recently, an innovative trend like cloud computing has progressed quickly in InformationTechnology. For a background of distributed networks, the extensive sprawl of internet resources on the Web and the increasing number of service providers helped ...
D. Stalin David   +6 more
semanticscholar   +1 more source

Impact of prior SARS-CoV-2 infection and COVID-19 vaccination on the subsequent incidence of COVID-19: a multicentre prospective cohort study among UK healthcare workers – the SIREN (Sarscov2 Immunity & REinfection EvaluatioN) study protocol

open access: yesBMJ Open, 2022
Introduction Understanding the effectiveness and durability of protection against SARS-CoV-2 infection conferred by previous infection and COVID-19 is essential to inform ongoing management of the pandemic. This study aims to determine whether prior SARS-
Nick Andrews   +21 more
doaj   +1 more source

CPT‐TODIM method for bipolar fuzzy multi‐attribute group decision making and its application to network security service provider selection

open access: yesInternational Journal of Intelligent Systems, 2021
Network security is a very important issue in recent years. For many new or traditional enterprises, utilizing internet to store and analyze data has become an indivisible part of their production and operation.
Mengwei Zhao   +3 more
semanticscholar   +1 more source

A Dynamic Deployment Method of Security Services Based on Malicious Behavior Knowledge Base

open access: yesSensors, 2022
In view of various security requirements, there are various security services in the network. In particular, DDoS attacks have various types and detection methods. How to flexibly combine security services and make full use of the information provided by
Qi Guo, Man Li, Weilin Wang, Ying Liu
doaj   +1 more source

BIBLICAL IMAGES-SYMBOLS IN FRANK PERETTI’S MYSTICAL THRILLERS: LINGUAL REPRESENTATION AND PRAGMATIC VALUE [PDF]

open access: yesВісник університету ім. А. Нобеля. Серія Філологічні науки, 2023
The paper aims to clarify the biblical image-symbols in Frank Peretti’s mystical thrillers. The problem of the detailed analysis of the lingual representation of the biblical image-symbols and their pragmatic value is solved in the article by applying ...
Polina S. Khabotniakova   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy