Results 61 to 70 of about 829,033 (289)
Wireless LAN Security Threats & Vulnerabilities [PDF]
Las LAN inalámbricas están en todas partes en estos días, desde el hogar hasta las grandes redes corporativas empresariales, debido a la facilidad de instalación, la comodidad de los empleados, la evitación de los costos de cableado y el soporte de movilidad constante.
Md. Waliullah, Diane Gan
openaire +1 more source
Risk Assessment of Autonomous Vehicles Using Bayesian Defense Graphs
Recent developments have made autonomous vehicles (AVs) closer to hitting our roads. However, their security is still a major concern among drivers as well as manufacturers.
Behfarnia, Ali, Eslami, Ali
core +1 more source
By integrating data from in vitro, ex vivo, and in vivo models, our research identifies the MARV glycoprotein as a remarkable hemorrhagic factor, filling a major gap in this important field. It also provides practical experimental tools for the basic research on viral pathogenesis and applied research aimed at antiviral intervention for hemorrhagic ...
Ting Yao +11 more
wiley +1 more source
Hybrid warfare and asymmetric security threats [PDF]
Globalization with all its positive and negative effects, current events on the international scene, practice of international relations development, outbreak and management of conflicts around the globe, emergence of nonlinear and asymmetric forms of ...
Mitrović Miroslav
doaj +1 more source
An analysis of security issues in building automation systems [PDF]
The purpose of Building Automation Systems (BAS) is to centralise the management of a wide range of building services, through the use of integrated protocol and communication media.
Johnstone, Michael N, Peacock, Matthew D
core +2 more sources
By integrating single‐nuclei and spatial transcriptomics, this study presents a stereoscopic landscape of maize leaf to Puccinia polysora infection. Epidermal and mesophyll cells initiate primary defenses via RLPs/RLKs and jasmonic acid signaling. Cell‐cell communication analyses further reveal the underlying the dynamics of the underlying immune ...
Qiongqiong Wang +16 more
wiley +1 more source
METHOD OF JUSTIFICATION OF THE ESTIMATED COSTS FOR INFORMATION SECURITY BUDGET ORGANIZATIONS
The paper presents a new approach to substantiate the amount of expenses on information security, step-by-step algorithm offinding the balance between information security threats and the cost of protection.
Igor Mandritsa +3 more
doaj
This study presents the first telomere‐to‐telomere genomes and population resources for Diaporthe pathogens, uncovering the largest known fungal repertoire of secondary metabolite gene clusters. Structural variations and horizontal gene transfer drive cluster diversification, while specific rapidly evolving clusters control virulence, offering novel ...
Kainan Li +9 more
wiley +1 more source
Contemporary security threats in Africa
The analysis of potential and actual security threats and challenges leads us to the conclusion that Africa is one of the most endangered continents. Constant confrontations, wars, internal political crises, local and international terrorism, organized ...
Darko Trifunovic
doaj +1 more source
Towards Security Goals in Summative E-Assessment Security
The general security goals of a computer system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats.
Apampa, K.M, Argles, D, Wills, G.B
core +1 more source

