Results 51 to 60 of about 8,750,178 (391)

Modern approaches to carrying out profound medical examination of servicemen of Security Service of Ukraine [PDF]

open access: yesMedičnì Perspektivi, 2013
The study found that the regulatory framework for prophylactic medical examination in the Security Service of Ukraine (SSU) is not fully regulated, this required the development and validation of a new organizational model to improve its efficiency.
Lurin I.A.   +5 more
doaj  

A New Approach for Delivering Customized Security Everywhere: Security Service Chain

open access: yesSecur. Commun. Networks, 2017
Security functions are usually deployed on proprietary hardware, which makes the delivery of security service inflexible and of high cost. Emerging technologies such as software-defined networking and network function virtualization go in the direction ...
Yi Liu   +3 more
semanticscholar   +1 more source

Access to information about the activities of the Security Service of Ukraine in the context of countering disinformation

open access: yesBulletin of Kharkiv National University of Internal Affairs, 2022
Rapid globalization and informatization of everyday processes, mass use of Internet resources and social networks contribute to the uncontrolled spread of disinformation.
A. I. Marushchak, N. O. Kudriavtseva
doaj   +1 more source

Adoption of security as a service [PDF]

open access: yesJournal of Internet Services and Applications, 2013
Security as a Service systems enable new opportunities to compose security infrastructures for information systems. However, to date there are no holistic insights about their adoption and relevant predictors. Based on existing technology acceptance models we developed an extended application-specific research model including formative and reflective ...
openaire   +2 more sources

Tailored Security: Building Nonrepudiable Security Service-Level Agreements [PDF]

open access: yesIEEE Vehicular Technology Magazine, 2013
The security features of current digital services are mostly defined and dictated by the service provider (SP). A user can always decline to use a service whose terms do not fulfill the expected criteria, but in many cases, even a simple negotiation ...
Takeshi Takahashi   +4 more
semanticscholar   +1 more source

TO THE 110-TH ANNIVERSARY OF RENIN FINDING. FIGHT OF TITANS: ANGIOTENSIN CONVERTING ENZYME INHIBITORS AND SARTANS

open access: yesРациональная фармакотерапия в кардиологии, 2016
Angiotensin converting enzyme (ACE) inhibitors and angiotensin II receptor blockers (ARB) slow down progression of cardiovascular diseases and reduce risk of mortality and life threatening complications.
L. N. Malay   +3 more
doaj   +1 more source

Modular plans for secure service composition [PDF]

open access: yesJournal of Computer Security, 2010
Service Oriented Computing (SOC) is a programming paradigm aim-ing at characterising Service Networks. Services are entities waiting for clients requests and they often result from the composition of many services. We address here the problem of statically guaranteeing security of open services, i.e. services with unknown components.
COSTA, GABRIELE   +2 more
openaire   +12 more sources

MICROWAVE MIXER ON RECTANGULAR WAVEGUIDES PARTIALLY FILLED BY DIELECTRIC

open access: yesInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, 2023
The article investigates and calculates the characteristics of microwave mixers on rectangular waveguides partially filled by dielectric. Presents diagrams of promising combined microwave radio engineering systems - two options for constructing mobile ...
Vitaly Pochernyaev   +2 more
doaj   +1 more source

Повышение точности IP-геолокации на основе данных, предоставляемых открытыми IP-геосервисами

open access: yesИнформатика и автоматизация, 2022
IP-геолокация – это процесс определения реального географического положения электронного устройства, подключенного к сети Интернет, по его глобальному сетевому адресу [1].
Maxim Ivanov, Alexander Polunin
doaj   +1 more source

Q-ESP: a QoS-compliant Security Protocol to enrich IPSec Framework [PDF]

open access: yes, 2009
IPSec is a protocol that allows to make secure connections between branch offices and allows secure VPN accesses. However, the efforts to improve IPSec are still under way; one aspect of this improvement is to take Quality of Service (QoS) requirements ...
Fraboul, Christian   +2 more
core   +3 more sources

Home - About - Disclaimer - Privacy