Results 131 to 140 of about 3,117,544 (197)
A self-evolution cyber attack scheme generation system for cybersecurity evaluation. [PDF]
Yang M +6 more
europepmc +1 more source
A Post-Quantum Secure RFID Authentication Protocol Based on NTRU Encryption Algorithm. [PDF]
Liu H, Wu H, Ge N, Dong Q.
europepmc +1 more source
Credibility measurement of cloud services based on information entropy and Markov chain. [PDF]
Ou L, Yu J.
europepmc +1 more source
Assessing restaurant nutrition quality and dietary factors that influence purchase of food away from home across different food security levels. [PDF]
Anderson A +3 more
europepmc +1 more source
6G -enabled qubit-based concealed communication with AI-driven breach detection in autonomous fleets. [PDF]
T V +3 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2022
Chapter 5 focuses on case studies of small states’ pursuit of their goals in the realm of international security. Small states have long been understood to be particularly limited—even existentially threatened—in the security sphere. This chapter’s cases suggest significant variation in security outcomes for small states.
openaire +1 more source
Chapter 5 focuses on case studies of small states’ pursuit of their goals in the realm of international security. Small states have long been understood to be particularly limited—even existentially threatened—in the security sphere. This chapter’s cases suggest significant variation in security outcomes for small states.
openaire +1 more source
State Security, Societal Security, and Human Security
Jadavpur Journal of International Relations, 2017Generally speaking, the traditional approach of security mainly regards states as a sole referent object of security and refutes any attempt to broaden the concept of security. This understanding is known as a realist approach. This approach, however, has been recently challenged by the Copenhagen School, the Welsh School, and the human security ...
openaire +1 more source
2006 IEEE Information Assurance Workshop, 2006
The information assurance (IA) model, an extension of the McCumber information security model, specifies security services for information when it is at rest, in transit, or being processed. According to the IA model, the processing information state is protected by technology, operations, and people security countermeasures. However, what has not been
openaire +1 more source
The information assurance (IA) model, an extension of the McCumber information security model, specifies security services for information when it is at rest, in transit, or being processed. According to the IA model, the processing information state is protected by technology, operations, and people security countermeasures. However, what has not been
openaire +1 more source

