Results 241 to 250 of about 829,033 (289)
Some of the next articles are maybe not open access.

Secure and Robust Cyber Security Threat Information Sharing

2022
In recent years, several laws have been decreed, at both national and European levels, to mandate private and public organizations to share their Cyber Security related information. However, exist- ing threat sharing platforms implement ”classical” access control mechanisms or at most centralized attribute-based encryption (ABE) to prevent data leakage
Bkakria, Anis, Yaich, Reda, Arabi, Walid
openaire   +2 more sources

5G Security Threats

2022 International Conference on Data Analytics for Business and Industry (ICDABI), 2022
Aysha H. Alfaw, Alauddin Al-Omary
openaire   +1 more source

Security Issues: Old Threats, New Threats, No Threats

1997
This study surveys the current and prospective security situation in East Asia. The importance of the area is apparent and needs no elaboration. It can only grow in the years ahead. While the current situation is relatively benign, there is widespread uneasiness about the future, concern that the end of the cold war will eventually mean an unravelling ...
openaire   +1 more source

A Threat to National Security

Science, 2012
The United States faces one of the most perilous conditions that I can remember in my professional life. The greatest threat we face today is not external, but internal. Our inability as a nation to reach a durable consensus on plans that match our national goals with our financial resources is, in my judgment, the greatest National Security risk.
openaire   +2 more sources

Insect threats to food security

Science, 2018
Pest damage to crops will increase substantially in many regions as the planet continues to ...
openaire   +3 more sources

Security Threats

2022
Joanna F. DeFranco, Bob Maley
openaire   +1 more source

VoIP Security Threats

International Journal of Information Security and Cybercrime
Nowadays, communication is based on a wide variety of solutions, especially using the real-time ones. People use a lot of online tools that offer them audio-video solutions, and the most important thing is that anyone has access to them, and there are easy to use.
openaire   +1 more source

Reconceptualizing Security Threats

2021
Christian Kaunert, Ori Wertman
openaire   +1 more source

Mobile Security – Light on Security Threats

International Journal of Emerging Technology and Advanced Engineering
The smartphone has evolved into a little computer that can perform all of our daily tasks, including social media use, email correspondence, and banking. The use of smartphones is also increasing quickly. Because there are more and more connected biases in the network field every day, cyberattacks are also increasing. All connected device linked to the
Diksha Batham   +5 more
openaire   +1 more source

The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses

IEEE Communications Surveys and Tutorials, 2021
Ivan Homoliak   +2 more
exaly  

Home - About - Disclaimer - Privacy