Results 281 to 290 of about 6,779,765 (359)

A novel and secure artificial intelligence enabled zero trust intrusion detection in industrial internet of things architecture. [PDF]

open access: yesSci Rep
Laghari AA   +7 more
europepmc   +1 more source

Joint Pricing and Security Investment in Cloud Security Service Market With User Interdependency

IEEE Transactions on Services Computing, 2020
After several decades of development on cyber security techniques, one clear conclusion can be drawn: no cyber security solution can completely remove the risks faced by the users.
Shaohan Feng   +5 more
semanticscholar   +1 more source

Security Service

Ensuring the Integrity of Electronic Health Records, 2020
“PROTECTION” OF SILESIAN HARD COAL MINES BY THE STATE 1980S (ON EXAMPLE HARD COAL MINE “KATOWICE”) During the entire period of the Polish People’s Republic the Polish state security forces conducted surveillance operations of factories and other ...
O. López
semanticscholar   +1 more source

Security by Insurance for Services

2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), 2016
It is hard to guarantee proper protection in the Service Oriented Architecture (SOA), when a client outsources a part of its business or sends private data to a services provider. Various solutions proposed so far mostly require evidences of proper protection (e.g., source code for verification or execution traces for monitoring), which are to be ...
F Martinelli, A Yautsiukhin
openaire   +4 more sources

Efficient Provisioning of Security Service Function Chaining Using Network Security Defense Patterns

IEEE Transactions on Services Computing, 2019
Network functions virtualization intertwined with software-defined networking opens up great opportunities for flexible provisioning and composition of network functions, known as network service chaining.
Alireza Shameli-Sendi   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy