A Secure Broadcast Service for LDACS with an Application to Secure GBAS [PDF]
The VHF Data Broadcast (VDB) data link is responsible for transmitting Ground Based Augmentation System (GBAS) corrections from the GBAS ground station to the aircraft. Thus, it is a major bottleneck for the evolution and security of GBAS. It provides limited bandwidth, range, only line-of-sight capabilities, and no cyber-security protections for the ...
Mäurer, Nils+4 more
openaire +3 more sources
To keep its business reliable, Google is concerned to ensure the quality of apps on the store. One crucial aspect concerning quality is security. Security is achieved through Google Play protect and anti-malware solutions.
Franklin Tchakounté+3 more
doaj +1 more source
A Survey on Digital Twins: Architecture, Enabling Technologies, Security and Privacy, and Future Prospects [PDF]
By interacting, synchronizing, and cooperating with its physical counterpart in real time, digital twin (DT) is promised to promote an intelligent, predictive, and optimized modern city.
Yuntao Wang+5 more
semanticscholar +1 more source
Collection and Use of Information by Counter-Intelligence in the Context of Human Rights Protection
Obtaining complete and reliable information during counter-intelligence activities is very critical. The extraction, analytical processing, and use of information regarding signs and facts of intelligence, terroristic, and other activities of special ...
Antonina Dimich+4 more
doaj +1 more source
Software Defined Security Service Provisioning Framework for Internet of Things [PDF]
Programmable management framework have paved the way for managing devices in the network. Lately, emerging paradigm of Software Defined Networking (SDN) have rev-olutionized programmable networks. Designers of networking applications i.e.
F. Khan, S. Hameed
semanticscholar +1 more source
Mathematical model for controlling CO2 concentration in greenhouses late in MATLAB [PDF]
The article is devoted to the development of an automated control system for irradiation facilities. The system will optimize the electricity cost for supplementary lighting plants in greenhouses without economic losses. A number of scientific researches
Ivliev Sergey N.+3 more
doaj +1 more source
Criminal law protection of critical infrastructure objects against subversive encroachments
The norms of domestic and foreign legislation, which establish a criminal law prohibition of encroachments on objects of critical importance for the economy, defense and life support of the population for subversive purposes, have been studied.
О. V. Shamsutdinov, D. S. Melnyk
doaj +1 more source
SECURITY TOKEN SERVICE SYSTEM ADMINISTRATOR GUIDE [PDF]
The Security Token Service (STS) is a partial implementation of the OASIS WS-Trust specification.It is a service that can be used for transforming an existing security token into another security token ...
White, John
core +1 more source
An architecture for certification-aware service discovery [PDF]
Service-orientation is an emerging paradigm for building complex systems based on loosely coupled components, deployed and consumed over the network. Despite the original intent of the paradigm, its current instantiations are limited to a single trust ...
Bezzi, M., Sabetta, A., Spanoudakis, G.
core +1 more source
The Basics of Manageability and Projecting of Management Structures in the System of Economic Security of Enterprise [PDF]
The article set up a problem of the need to combine the ideology of approaches to ensuring the economic security of enterprise with its properties as a management object, which should become the basis of projecting management structures in the system of ...
Bogdanov Roman I.
doaj +1 more source