Results 11 to 20 of about 6,779,765 (359)

Security as a Service [PDF]

open access: bronzeThe Geneva Papers on Risk and Insurance - Issues and Practice, 1978
Today, it is hardly necessary to emphasize the fact particularly that the successful existence of the enterprise as an economic unit is no longer so self-evident as it has been in former years. The achievement of commensurate profits, maintaining the substance of business or in extreme cases even the survival of the enterprise : all these are being ...
Hans Braunschweiler
openalex   +3 more sources

Quality of Security Service: Adaptive Security

open access: green, 2004
Abstract : The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks. In this approach, the "level of service" must be within an acceptable range, and can indicate degrees of security with respect to
Timothy E. Levin   +2 more
openalex   +6 more sources

Characterization of the Infant Immune System and the Influence and Immunogenicity of BCG Vaccination in Infant and Adult Rhesus Macaques

open access: yesFrontiers in Immunology, 2021
In many countries where tuberculosis (TB) is endemic, the Bacillus Calmette–Guérin (BCG) vaccine is given as close to birth as possible to protect infants and children from severe forms of TB.
Charlotte Sarfas   +9 more
doaj   +1 more source

Software as a service and security [PDF]

open access: yesWorld Journal of Advanced Research and Reviews, 2021
Nowadays, Cloud Computing is an important hi-tech research area in the most recent innovation. These advancements give clients a few benefits: cost-adequacy, effective asset usage, cooperation, catastrophe recuperation, and elite. Cloud offers administrations for processing on a solitary mouse click.
openaire   +3 more sources

PredictDeep: Security Analytics as a Service for Anomaly Detection and Prediction

open access: yesIEEE Access, 2020
As businesses embrace digitization, the Internet of Everything (IoE) begins to take shape and the Cloud continues to empower new innovations for big data -at the heart, Cloud analytic applications gain increasing momentum.
Marwa A. Elsayed, Mohammad Zulkernine
doaj   +1 more source

Critical appraisal in rapid systematic reviews of COVID-19 studies: implementation of the Quality Criteria Checklist (QCC)

open access: yesSystematic Reviews, 2023
In this letter, we briefly describe how we selected and implemented the quality criteria checklist (QCC) as a critical appraisal tool in rapid systematic reviews conducted to inform public health advice, guidance and policy during the COVID-19 pandemic ...
Daphne Duval   +5 more
doaj   +1 more source

Problems of building consolidated corporation strategies for corporate information security management in the EMEA region

open access: yesВісник Харківського національного університету імені В.Н. Каразіна: Серія Міжнародні відносини, економіка, країнознавство, туризм, 2021
The problems of development and construction of a universal consolidated strategy of interaction of IT services and information security, which is based on the study and in-depth analysis of statistics on the current situation with the interaction of ...
Serhii Lubenets   +2 more
doaj   +1 more source

SDN/NFV-Based Security Service Function Tree for Cloud

open access: yesIEEE Access, 2020
Network security for cloud computing is very important. Service function chain (SFC) that integrates software defined network (SDN) and network function virtualization (NFV) can provide a new approach for solving the network security issues for cloud ...
Jing-Lun Luo, Shunzheng Yu, Si-Jie Peng
semanticscholar   +1 more source

A Secure Broadcast Service for LDACS with an Application to Secure GBAS [PDF]

open access: yes2021 IEEE/AIAA 40th Digital Avionics Systems Conference (DASC), 2021
The VHF Data Broadcast (VDB) data link is responsible for transmitting Ground Based Augmentation System (GBAS) corrections from the GBAS ground station to the aircraft. Thus, it is a major bottleneck for the evolution and security of GBAS. It provides limited bandwidth, range, only line-of-sight capabilities, and no cyber-security protections for the ...
Mäurer, Nils   +4 more
openaire   +3 more sources

Transport Network Slices with Security Service Level Agreements

open access: yesInternational Conference on Transparent Optical Networks, 2020
This paper presents an initial architecture to manage End-to-End Network Slices which, once deployed, are associated with Security Service Level Agreement(s) to increase the security on the virtual deployed resources and create End-to-End Secure Network ...
P. Alemany   +6 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy