Results 21 to 30 of about 8,750,178 (391)
A Secure Broadcast Service for LDACS with an Application to Secure GBAS [PDF]
The VHF Data Broadcast (VDB) data link is responsible for transmitting Ground Based Augmentation System (GBAS) corrections from the GBAS ground station to the aircraft. Thus, it is a major bottleneck for the evolution and security of GBAS. It provides limited bandwidth, range, only line-of-sight capabilities, and no cyber-security protections for the ...
Mäurer, Nils+4 more
openaire +3 more sources
Transport Network Slices with Security Service Level Agreements
This paper presents an initial architecture to manage End-to-End Network Slices which, once deployed, are associated with Security Service Level Agreement(s) to increase the security on the virtual deployed resources and create End-to-End Secure Network ...
P. Alemany+6 more
semanticscholar +1 more source
To keep its business reliable, Google is concerned to ensure the quality of apps on the store. One crucial aspect concerning quality is security. Security is achieved through Google Play protect and anti-malware solutions.
Franklin Tchakounté+3 more
doaj +1 more source
A Survey on Digital Twins: Architecture, Enabling Technologies, Security and Privacy, and Future Prospects [PDF]
By interacting, synchronizing, and cooperating with its physical counterpart in real time, digital twin (DT) is promised to promote an intelligent, predictive, and optimized modern city.
Yuntao Wang+5 more
semanticscholar +1 more source
Collection and Use of Information by Counter-Intelligence in the Context of Human Rights Protection
Obtaining complete and reliable information during counter-intelligence activities is very critical. The extraction, analytical processing, and use of information regarding signs and facts of intelligence, terroristic, and other activities of special ...
Antonina Dimich+4 more
doaj +1 more source
SECURITY TOKEN SERVICE SYSTEM ADMINISTRATOR GUIDE [PDF]
The Security Token Service (STS) is a partial implementation of the OASIS WS-Trust specification.It is a service that can be used for transforming an existing security token into another security token ...
White, John
core +1 more source
Mathematical model for controlling CO2 concentration in greenhouses late in MATLAB [PDF]
The article is devoted to the development of an automated control system for irradiation facilities. The system will optimize the electricity cost for supplementary lighting plants in greenhouses without economic losses. A number of scientific researches
Ivliev Sergey N.+3 more
doaj +1 more source
Criminal law protection of critical infrastructure objects against subversive encroachments
The norms of domestic and foreign legislation, which establish a criminal law prohibition of encroachments on objects of critical importance for the economy, defense and life support of the population for subversive purposes, have been studied.
О. V. Shamsutdinov, D. S. Melnyk
doaj +1 more source
Software Defined Security Service Provisioning Framework for Internet of Things [PDF]
Programmable management framework have paved the way for managing devices in the network. Lately, emerging paradigm of Software Defined Networking (SDN) have rev-olutionized programmable networks. Designers of networking applications i.e.
F. Khan, S. Hameed
semanticscholar +1 more source
An architecture for certification-aware service discovery [PDF]
Service-orientation is an emerging paradigm for building complex systems based on loosely coupled components, deployed and consumed over the network. Despite the original intent of the paradigm, its current instantiations are limited to a single trust ...
Bezzi, M., Sabetta, A., Spanoudakis, G.
core +1 more source