Results 51 to 60 of about 8,618,364 (391)

Access to information about the activities of the Security Service of Ukraine in the context of countering disinformation

open access: yesBulletin of Kharkiv National University of Internal Affairs, 2022
Rapid globalization and informatization of everyday processes, mass use of Internet resources and social networks contribute to the uncontrolled spread of disinformation.
A. I. Marushchak, N. O. Kudriavtseva
doaj   +1 more source

A New Approach for Delivering Customized Security Everywhere: Security Service Chain

open access: yesSecur. Commun. Networks, 2017
Security functions are usually deployed on proprietary hardware, which makes the delivery of security service inflexible and of high cost. Emerging technologies such as software-defined networking and network function virtualization go in the direction ...
Yi Liu   +3 more
semanticscholar   +1 more source

TO THE 110-TH ANNIVERSARY OF RENIN FINDING. FIGHT OF TITANS: ANGIOTENSIN CONVERTING ENZYME INHIBITORS AND SARTANS

open access: yesРациональная фармакотерапия в кардиологии, 2016
Angiotensin converting enzyme (ACE) inhibitors and angiotensin II receptor blockers (ARB) slow down progression of cardiovascular diseases and reduce risk of mortality and life threatening complications.
L. N. Malay   +3 more
doaj   +1 more source

MICROWAVE MIXER ON RECTANGULAR WAVEGUIDES PARTIALLY FILLED BY DIELECTRIC

open access: yesInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, 2023
The article investigates and calculates the characteristics of microwave mixers on rectangular waveguides partially filled by dielectric. Presents diagrams of promising combined microwave radio engineering systems - two options for constructing mobile ...
Vitaly Pochernyaev   +2 more
doaj   +1 more source

Adoption of security as a service [PDF]

open access: yesJournal of Internet Services and Applications, 2013
Security as a Service systems enable new opportunities to compose security infrastructures for information systems. However, to date there are no holistic insights about their adoption and relevant predictors. Based on existing technology acceptance models we developed an extended application-specific research model including formative and reflective ...
openaire   +2 more sources

Modular plans for secure service composition [PDF]

open access: yesJournal of Computer Security, 2010
Service Oriented Computing (SOC) is a programming paradigm aim-ing at characterising Service Networks. Services are entities waiting for clients requests and they often result from the composition of many services. We address here the problem of statically guaranteeing security of open services, i.e. services with unknown components.
COSTA, GABRIELE   +2 more
openaire   +12 more sources

Повышение точности IP-геолокации на основе данных, предоставляемых открытыми IP-геосервисами

open access: yesИнформатика и автоматизация, 2022
IP-геолокация – это процесс определения реального географического положения электронного устройства, подключенного к сети Интернет, по его глобальному сетевому адресу [1].
Maxim Ivanov, Alexander Polunin
doaj   +1 more source

Selection of Candidates for Positions in Higher Education Institution from the Standpoint of Their Potential Loyalty to Employer

open access: yesВысшее образование в России, 2020
The article focuses on the personal characteristics of candidates for employment in higher education institutions. The presence of a number of features in a candidate, with high probability, determines their potential disloyalty to any employer in the ...
A. R. Alaverdov, T. P. Alaverdova
doaj   +1 more source

Q-ESP: a QoS-compliant Security Protocol to enrich IPSec Framework [PDF]

open access: yes, 2009
IPSec is a protocol that allows to make secure connections between branch offices and allows secure VPN accesses. However, the efforts to improve IPSec are still under way; one aspect of this improvement is to take Quality of Service (QoS) requirements ...
Fraboul, Christian   +2 more
core   +3 more sources

CYCLIC SYSTEM FOR TRAINING SPECIALISTS OF ECONOMIC SECURITY OF ENTERPRISES AND ORGANIZATIONS

open access: yesВестник университета, 2020
It has been proved that the introduction of a cyclic system of professional training of specialists in economic security of enterprises and organizations contributes to increasing the efficiency of their functioning, competitiveness, financial and ...
M. N. Vlasenko   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy