Results 21 to 30 of about 6,779,765 (359)
A Survey on Digital Twins: Architecture, Enabling Technologies, Security and Privacy, and Future Prospects [PDF]
By interacting, synchronizing, and cooperating with its physical counterpart in real time, digital twin (DT) is promised to promote an intelligent, predictive, and optimized modern city.
Yuntao Wang+5 more
semanticscholar +1 more source
To keep its business reliable, Google is concerned to ensure the quality of apps on the store. One crucial aspect concerning quality is security. Security is achieved through Google Play protect and anti-malware solutions.
Franklin Tchakounté+3 more
doaj +1 more source
Collection and Use of Information by Counter-Intelligence in the Context of Human Rights Protection
Obtaining complete and reliable information during counter-intelligence activities is very critical. The extraction, analytical processing, and use of information regarding signs and facts of intelligence, terroristic, and other activities of special ...
Antonina Dimich+4 more
doaj +1 more source
Software Defined Security Service Provisioning Framework for Internet of Things [PDF]
Programmable management framework have paved the way for managing devices in the network. Lately, emerging paradigm of Software Defined Networking (SDN) have rev-olutionized programmable networks. Designers of networking applications i.e.
F. Khan, S. Hameed
semanticscholar +1 more source
Mathematical model for controlling CO2 concentration in greenhouses late in MATLAB [PDF]
The article is devoted to the development of an automated control system for irradiation facilities. The system will optimize the electricity cost for supplementary lighting plants in greenhouses without economic losses. A number of scientific researches
Ivliev Sergey N.+3 more
doaj +1 more source
Criminal law protection of critical infrastructure objects against subversive encroachments
The norms of domestic and foreign legislation, which establish a criminal law prohibition of encroachments on objects of critical importance for the economy, defense and life support of the population for subversive purposes, have been studied.
О. V. Shamsutdinov, D. S. Melnyk
doaj +1 more source
Performance Verification of SeqType® P52 Human Ancestry Identification SNP Detection Kit [PDF]
Objective To evaluate the discrimination efficiency of the SeqType P52 Human Ancestry Identification SNP Detection Kit based on a high-throughput sequencing platform in five Chinese ethnic groups.
WANG Ying-xi, MA Yuan, LI Fu, et al.
doaj +1 more source
Specificities of non-intelligence work of modern security services [PDF]
The security services, from their inception to the present day have played a very important, if not decisive, role in all major events that have taken place in states since their inception.
Labović Dejan R.+2 more
doaj +1 more source
Secure Service Orchestration [PDF]
We present a framework for designing and composing services in a secure manner. Services can enforce security policies locally, and can invoke other services in a "call-by-contract" fashion. This mechanism offers a significant set of opportunities, each driving secure ways to compose services.
M. BARTOLETTI+3 more
openaire +5 more sources
Background Since the end of January 2020, the coronavirus (COVID-19) pandemic has been responsible for a global health crisis. In England a number of non-pharmaceutical interventions have been introduced throughout the pandemic, including guidelines on ...
Claire F. Ferraro+8 more
doaj +1 more source