Results 241 to 250 of about 829,033 (289)
Some of the next articles are maybe not open access.
Secure and Robust Cyber Security Threat Information Sharing
2022In recent years, several laws have been decreed, at both national and European levels, to mandate private and public organizations to share their Cyber Security related information. However, exist- ing threat sharing platforms implement ”classical” access control mechanisms or at most centralized attribute-based encryption (ABE) to prevent data leakage
Bkakria, Anis, Yaich, Reda, Arabi, Walid
openaire +2 more sources
2022 International Conference on Data Analytics for Business and Industry (ICDABI), 2022
Aysha H. Alfaw, Alauddin Al-Omary
openaire +1 more source
Aysha H. Alfaw, Alauddin Al-Omary
openaire +1 more source
Security Issues: Old Threats, New Threats, No Threats
1997This study surveys the current and prospective security situation in East Asia. The importance of the area is apparent and needs no elaboration. It can only grow in the years ahead. While the current situation is relatively benign, there is widespread uneasiness about the future, concern that the end of the cold war will eventually mean an unravelling ...
openaire +1 more source
Science, 2012
The United States faces one of the most perilous conditions that I can remember in my professional life. The greatest threat we face today is not external, but internal. Our inability as a nation to reach a durable consensus on plans that match our national goals with our financial resources is, in my judgment, the greatest National Security risk.
openaire +2 more sources
The United States faces one of the most perilous conditions that I can remember in my professional life. The greatest threat we face today is not external, but internal. Our inability as a nation to reach a durable consensus on plans that match our national goals with our financial resources is, in my judgment, the greatest National Security risk.
openaire +2 more sources
Insect threats to food security
Science, 2018Pest damage to crops will increase substantially in many regions as the planet continues to ...
openaire +3 more sources
International Journal of Information Security and Cybercrime
Nowadays, communication is based on a wide variety of solutions, especially using the real-time ones. People use a lot of online tools that offer them audio-video solutions, and the most important thing is that anyone has access to them, and there are easy to use.
openaire +1 more source
Nowadays, communication is based on a wide variety of solutions, especially using the real-time ones. People use a lot of online tools that offer them audio-video solutions, and the most important thing is that anyone has access to them, and there are easy to use.
openaire +1 more source
Mobile Security – Light on Security Threats
International Journal of Emerging Technology and Advanced EngineeringThe smartphone has evolved into a little computer that can perform all of our daily tasks, including social media use, email correspondence, and banking. The use of smartphones is also increasing quickly. Because there are more and more connected biases in the network field every day, cyberattacks are also increasing. All connected device linked to the
Diksha Batham +5 more
openaire +1 more source

