Results 271 to 280 of about 13,481,561 (335)
Some of the next articles are maybe not open access.

Autonomous Driving Security: State of the Art and Challenges

IEEE Internet of Things Journal, 2022
The autonomous driving industry has mushroomed over the past decade. Although autonomous driving has undoubtedly become one of the most promising technologies of this century, its development faces multiple challenges, of which security is the major ...
C. Gao   +4 more
semanticscholar   +1 more source

Modern state security

Complex Adaptive Systems, Resilience and Security in Cameroon, 2019
Manu Lekunze
openaire   +2 more sources

Small-State Security

2022
Chapter 5 focuses on case studies of small states’ pursuit of their goals in the realm of international security. Small states have long been understood to be particularly limited—even existentially threatened—in the security sphere. This chapter’s cases suggest significant variation in security outcomes for small states.
openaire   +1 more source

Secure State Processing

2006 IEEE Information Assurance Workshop, 2006
The information assurance (IA) model, an extension of the McCumber information security model, specifies security services for information when it is at rest, in transit, or being processed. According to the IA model, the processing information state is protected by technology, operations, and people security countermeasures. However, what has not been
openaire   +1 more source

The Security State

2010
AbstractThis article explores developments in the UK security state, concentrating on the intelligence and security services, together with the Whitehall machinery that connects these agencies with the core executive. It also addresses related aspects of security policing or ‘high policing’.
openaire   +1 more source

STATE SECURITY SYSTEM

Security Forum
The objective of the article is to present the state security system and indicate research and adaptation directions undertaken by scientists that shape the changing security conditions. It is claimed that the internal and external environment of the state security system is characterized by constant variability, which is of fundamental importance in ...
Łępicki, Jacek, Łępicki, Jacek
openaire   +1 more source

From State Security to Human Security

SSRN Electronic Journal, 2007
Today, many individuals are victims, not of foreign military aggression and nuclear war, but of violence committed against them by their own state. Moreover, the security of individuals is threatened, not by military forces, but by criminals and terrorists, the forces of nature, disease, and poverty.
openaire   +2 more sources

State Security Agent

This chapter attempts to explore the interaction between national sovereignty and private security companies, taking Myanmar and Cambodia as examples. After the end of the cold war, some countries are still in the process of State-building. To ensure domestic and international security, the authorities decided to take their security off the border and ...
Meng Yang, Yuhong Li
openaire   +1 more source

Secure States versus Secure Executions

2013
Several points of view exist about security policies among which two main approaches can be distinguished: policies can be defined by some properties over states of a system or by some properties over exe- cutions of a system. While enforcing a policy specified by some properties over states is rather easy, designing enforcement mechanisms to ensure ...
Jaume, Mathieu   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy