Results 231 to 240 of about 829,033 (289)
US new playbook for global health: balancing national interest and global responsibility. [PDF]
Aremu SO +6 more
europepmc +1 more source
Spatiotemporal analysis of nontraditional security issues evolution globally: evidence from news big data. [PDF]
Li J +5 more
europepmc +1 more source
A collaborative multi-party encryption for mitigating man-in-the-middle attacks in smart grid and energy IoT systems. [PDF]
Alfawair M.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2016
This book explores citizens’ perceptions and experiences of security threats in contemporary Britain, drawing on perspectives from International Security Studies and Political Psychology. The empirical chapters are based on twenty focus groups across six British cities and a large sample survey conducted between April and September 2012. These data are
Daniel Stevens, Nick Vaughan-Williams
openaire +1 more source
This book explores citizens’ perceptions and experiences of security threats in contemporary Britain, drawing on perspectives from International Security Studies and Political Psychology. The empirical chapters are based on twenty focus groups across six British cities and a large sample survey conducted between April and September 2012. These data are
Daniel Stevens, Nick Vaughan-Williams
openaire +1 more source
2022
Online transactions have increased abruptly during the COVID-19 pandemic. In recent years, the expansion of easy banking in Bangladesh has become necessary, particularly when banks do not have sufficient branches in Bangladesh's rural areas. This research provides a quick overview, a managerial framework of cybersecurity, and several potential threats ...
Md. Manzurul Hasan +5 more
openaire +1 more source
Online transactions have increased abruptly during the COVID-19 pandemic. In recent years, the expansion of easy banking in Bangladesh has become necessary, particularly when banks do not have sufficient branches in Bangladesh's rural areas. This research provides a quick overview, a managerial framework of cybersecurity, and several potential threats ...
Md. Manzurul Hasan +5 more
openaire +1 more source
Microbiological threats to homeland security
IEEE Engineering in Medicine and Biology Magazine, 2004The American Type Culture Collection (ATCC) preserves, distributes, and disseminates data on a wide spectrum of microbiological agents. Figure I illustrates the types of information that can be obtained from ATCC's knowledge bases. As research generates more detailed data on microbes that can potentially be used for bioterror, it is becoming obvious ...
Prem, Yadav, Lois, Blaine
openaire +2 more sources
Secure Blockchain: Assessing Specific Security Threats
2021Blockchain technology originates from the Bitcoin system, and due to its great success it can draw awareness to other fields because of its global acceptable features like decentralization, anonymity, and audibility. Other than finance, blockchain technology has evolved in various applications like legal, supply chain, health care, etc.
Ganguly Ananya +3 more
openaire +1 more source
2005
Information security is an old concept where people, businesses, politicians, military leaders, and others have been trying to protect “sensitive” information from unauthorised or accidental loss, destruction, disclosure, modification, misuse, or access.
openaire +1 more source
Information security is an old concept where people, businesses, politicians, military leaders, and others have been trying to protect “sensitive” information from unauthorised or accidental loss, destruction, disclosure, modification, misuse, or access.
openaire +1 more source

