Results 11 to 20 of about 8,618,364 (391)

CPT‐TODIM method for bipolar fuzzy multi‐attribute group decision making and its application to network security service provider selection

open access: yesInternational Journal of Intelligent Systems, 2021
Network security is a very important issue in recent years. For many new or traditional enterprises, utilizing internet to store and analyze data has become an indivisible part of their production and operation.
Mengwei Zhao   +3 more
semanticscholar   +1 more source

A Dynamic Deployment Method of Security Services Based on Malicious Behavior Knowledge Base

open access: yesSensors, 2022
In view of various security requirements, there are various security services in the network. In particular, DDoS attacks have various types and detection methods. How to flexibly combine security services and make full use of the information provided by
Qi Guo, Man Li, Weilin Wang, Ying Liu
doaj   +1 more source

BIBLICAL IMAGES-SYMBOLS IN FRANK PERETTI’S MYSTICAL THRILLERS: LINGUAL REPRESENTATION AND PRAGMATIC VALUE [PDF]

open access: yesAlfred Nobel University Journal of Philology, 2023
The paper aims to clarify the biblical image-symbols in Frank Peretti’s mystical thrillers. The problem of the detailed analysis of the lingual representation of the biblical image-symbols and their pragmatic value is solved in the article by applying ...
Polina S. Khabotniakova   +1 more
doaj   +1 more source

Critical appraisal in rapid systematic reviews of COVID-19 studies: implementation of the Quality Criteria Checklist (QCC)

open access: yesSystematic Reviews, 2023
In this letter, we briefly describe how we selected and implemented the quality criteria checklist (QCC) as a critical appraisal tool in rapid systematic reviews conducted to inform public health advice, guidance and policy during the COVID-19 pandemic ...
Daphne Duval   +5 more
doaj   +1 more source

Software as a service and security [PDF]

open access: yesWorld Journal of Advanced Research and Reviews, 2021
Nowadays, Cloud Computing is an important hi-tech research area in the most recent innovation. These advancements give clients a few benefits: cost-adequacy, effective asset usage, cooperation, catastrophe recuperation, and elite. Cloud offers administrations for processing on a solitary mouse click.
openaire   +3 more sources

PredictDeep: Security Analytics as a Service for Anomaly Detection and Prediction

open access: yesIEEE Access, 2020
As businesses embrace digitization, the Internet of Everything (IoE) begins to take shape and the Cloud continues to empower new innovations for big data -at the heart, Cloud analytic applications gain increasing momentum.
Marwa A. Elsayed, Mohammad Zulkernine
doaj   +1 more source

Problems of building consolidated corporation strategies for corporate information security management in the EMEA region

open access: yesВісник Харківського національного університету імені В.Н. Каразіна: Серія Міжнародні відносини, економіка, країнознавство, туризм, 2021
The problems of development and construction of a universal consolidated strategy of interaction of IT services and information security, which is based on the study and in-depth analysis of statistics on the current situation with the interaction of ...
Serhii Lubenets   +2 more
doaj   +1 more source

SDN/NFV-Based Security Service Function Tree for Cloud

open access: yesIEEE Access, 2020
Network security for cloud computing is very important. Service function chain (SFC) that integrates software defined network (SDN) and network function virtualization (NFV) can provide a new approach for solving the network security issues for cloud ...
Jing-Lun Luo, Shunzheng Yu, Si-Jie Peng
semanticscholar   +1 more source

Characterization of the Infant Immune System and the Influence and Immunogenicity of BCG Vaccination in Infant and Adult Rhesus Macaques

open access: yesFrontiers in Immunology, 2021
In many countries where tuberculosis (TB) is endemic, the Bacillus Calmette–Guérin (BCG) vaccine is given as close to birth as possible to protect infants and children from severe forms of TB.
Charlotte Sarfas   +9 more
doaj   +1 more source

Transport Network Slices with Security Service Level Agreements

open access: yesInternational Conference on Transparent Optical Networks, 2020
This paper presents an initial architecture to manage End-to-End Network Slices which, once deployed, are associated with Security Service Level Agreement(s) to increase the security on the virtual deployed resources and create End-to-End Secure Network ...
P. Alemany   +6 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy