Results 31 to 40 of about 829,033 (289)
A taxonomy of malicious traffic for intrusion detection systems [PDF]
With the increasing number of network threats it is essential to have a knowledge of existing and new network threats to design better intrusion detection systems.
Atkinson, Robert +5 more
core +4 more sources
Difference in risk perception of onboard security threats by aircrew and aviation security experts
Airlines are increasingly relying on non-security personnel such as cabin crews and pilots to perform a security function when dealing with potential onboard security threats.
William Derrickson, Kartikeya Tripathi
doaj +1 more source
Identity Threats in the System of Attitudes to Personal Security
The study made an attempt to approach the problem of identity threats from the perspective of modern security psychology, which studies psychological attitude to personal security as a systemic phenomenon.
M. S. Ivanov
doaj +1 more source
Information security – its essence and threats [PDF]
Due to the exchange of information, organizations are encouraged to create an effective system of information flow that should be monitored on a regular basis in order to minimize the risk of emergence of threats.
Estera Pietras
doaj +1 more source
IDENTIFICATION OF THE MAIN SECURITY THREATS FOR SMALL AND LARGE NETWORKS
In modern conditions, it is quite difficult to keep track of all existing threats to network security. The article considers the main security threats for small and large networks in the context of their characteristics and features of detection ...
Aleksandr V. Ponachugin +2 more
doaj +1 more source
Security Threat Modeling [PDF]
Traditional threat modeling approaches such as Microsoft's STRIDE rely on Data Flow Diagrams (DFDs) as the main input. As DFDs are constructed from only five distinct model element types, these system models are deliberately kept simple. While this lowers the bar for practical adoption, there are a number of significant drawbacks.
Sion, Laurens +4 more
openaire +2 more sources
Ensuring Social Security in the Corporate Security Management System in Wartime Conditions [PDF]
The aim of the article is to closer define the theoretical foundations and develop methodological approaches for integrating social security into the corporate security management system under wartime conditions in order to enhance the resilience of ...
Mishyn Oleksandr Yu. +3 more
doaj +1 more source
Securing Internet Protocol (IP) Storage: A Case Study
Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast.
Murty, Ch. A. S +1 more
core +1 more source
Communication errors in online interactions
Information gathering, including in covert contexts, increasingly takes place in online environments amongst individuals from different cultures. Given that rapport facilitates information gathering, we investigated the perceived impact of communication
Lorraine Hope +4 more
doaj +1 more source
A Survey of Access Control Models in Wireless Sensor Networks [PDF]
Copyright 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/)Wireless sensor ...
Christianson, B. +3 more
core +2 more sources

