Results 11 to 20 of about 6,779,765 (359)
Today, it is hardly necessary to emphasize the fact particularly that the successful existence of the enterprise as an economic unit is no longer so self-evident as it has been in former years. The achievement of commensurate profits, maintaining the substance of business or in extreme cases even the survival of the enterprise : all these are being ...
Hans Braunschweiler
openalex +3 more sources
Quality of Security Service: Adaptive Security
Abstract : The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks. In this approach, the "level of service" must be within an acceptable range, and can indicate degrees of security with respect to
Timothy E. Levin+2 more
openalex +6 more sources
In many countries where tuberculosis (TB) is endemic, the Bacillus Calmette–Guérin (BCG) vaccine is given as close to birth as possible to protect infants and children from severe forms of TB.
Charlotte Sarfas+9 more
doaj +1 more source
Software as a service and security [PDF]
Nowadays, Cloud Computing is an important hi-tech research area in the most recent innovation. These advancements give clients a few benefits: cost-adequacy, effective asset usage, cooperation, catastrophe recuperation, and elite. Cloud offers administrations for processing on a solitary mouse click.
openaire +3 more sources
PredictDeep: Security Analytics as a Service for Anomaly Detection and Prediction
As businesses embrace digitization, the Internet of Everything (IoE) begins to take shape and the Cloud continues to empower new innovations for big data -at the heart, Cloud analytic applications gain increasing momentum.
Marwa A. Elsayed, Mohammad Zulkernine
doaj +1 more source
In this letter, we briefly describe how we selected and implemented the quality criteria checklist (QCC) as a critical appraisal tool in rapid systematic reviews conducted to inform public health advice, guidance and policy during the COVID-19 pandemic ...
Daphne Duval+5 more
doaj +1 more source
The problems of development and construction of a universal consolidated strategy of interaction of IT services and information security, which is based on the study and in-depth analysis of statistics on the current situation with the interaction of ...
Serhii Lubenets+2 more
doaj +1 more source
SDN/NFV-Based Security Service Function Tree for Cloud
Network security for cloud computing is very important. Service function chain (SFC) that integrates software defined network (SDN) and network function virtualization (NFV) can provide a new approach for solving the network security issues for cloud ...
Jing-Lun Luo, Shunzheng Yu, Si-Jie Peng
semanticscholar +1 more source
A Secure Broadcast Service for LDACS with an Application to Secure GBAS [PDF]
The VHF Data Broadcast (VDB) data link is responsible for transmitting Ground Based Augmentation System (GBAS) corrections from the GBAS ground station to the aircraft. Thus, it is a major bottleneck for the evolution and security of GBAS. It provides limited bandwidth, range, only line-of-sight capabilities, and no cyber-security protections for the ...
Mäurer, Nils+4 more
openaire +3 more sources
Transport Network Slices with Security Service Level Agreements
This paper presents an initial architecture to manage End-to-End Network Slices which, once deployed, are associated with Security Service Level Agreement(s) to increase the security on the virtual deployed resources and create End-to-End Secure Network ...
P. Alemany+6 more
semanticscholar +1 more source