Results 11 to 20 of about 829,033 (289)

IoT: Communication protocols and security threats

open access: yesInternet of Things and Cyber-Physical Systems, 2023
In this study, we review the fundamentals of IoT architecture and we thoroughly present the communication protocols that have been invented especially for IoT technology.
Apostolos Gerodimos   +4 more
doaj   +3 more sources

Hybrid threats to the security of the Republic of Serbia [PDF]

open access: yesВојно дело, 2017
The subject of the study of this paper are hybrid threats to the security of the Republic of Serbia, and they have been examined by the following elementary contents: the concept and characteristics of hybrid threats, the threat to the security of the ...
Stojković Dejan S.
doaj   +1 more source

International Peace and Security in Maritime Domain

open access: yesTeisė, 2022
The research aims at establishing which activities or situations in maritime domain, which threaten maritime safety and / or maritime security, fall within the concept of international peace and security.
Indrė Isokaitė-Valužė
doaj   +1 more source

Human Security: Undermining Human Rights? [PDF]

open access: yes, 2012
This article warns that the human security discourse and agenda could inadvertently undermine the international human rights regime. Insofar as human security identifies new threats to well-being, new victims of those threats, new duties of states, or ...
Howard-Hassmann, Rhoda E.
core   +3 more sources

On the inability of existing security models to cope with data mobility in dynamic organizations [PDF]

open access: yes, 2008
Modeling tools play an important role in identifying threats in traditional\ud IT systems, where the physical infrastructure and roles are assumed\ud to be static.
Dimkov, Trajce   +2 more
core   +9 more sources

Current security threats in the national and international context [PDF]

open access: yesContabilitate şi Informatică de Gestiune, 2020
Research Question: What are the main security threats emphasized by national and international surveys? Motivation: The rapid growth of IT brings worldwide security issues (Takahashi et al., 2010; Benjamin et al., 2015). IT usage brings new challenges (e.
Cristea Lavinia Mihaela
doaj   +1 more source

Security in Wireless Sensor Networks: Issues and Challenges [PDF]

open access: yes, 2006
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military.
Delic, H, Ersoy, C, Onel, T, Onur, Ertan
core   +3 more sources

UK energy security: challenges, threats and solutions [PDF]

open access: yes, 2011
Over the last few decades, the debate about 'Peak Oil' became increasingly common and frustrating to governments, oil companies and individuals. Also in the last decade or so, some unusual events took places, which have raised the concern about the ...
Abdo, H
core   +2 more sources

Ways to improve enterprise economic security in the conditions of digital transformation

open access: yesНаучно-технические ведомости СПбГПУ: Экономические науки, 2021
Digital transformation is the process of transition to a digital economy implemented by both economic sectors and individual enterprises in order to gain competitive advantages.
Babkin Aleksandr, Loshakov Andrey
doaj   +1 more source

Geoeconomic Strategies in the Modern Global Economic Space [PDF]

open access: yes, 2019
In today's context, it is considered that with the reduction of the risk of military intervention, military security has come to the forefront and economic security has become a priority for the national interests of the country.
Gaiduchok, O. (Oksana)
core   +3 more sources

Home - About - Disclaimer - Privacy