Results 271 to 280 of about 13,481,561 (335)
Some of the next articles are maybe not open access.
Autonomous Driving Security: State of the Art and Challenges
IEEE Internet of Things Journal, 2022The autonomous driving industry has mushroomed over the past decade. Although autonomous driving has undoubtedly become one of the most promising technologies of this century, its development faces multiple challenges, of which security is the major ...
C. Gao +4 more
semanticscholar +1 more source
Complex Adaptive Systems, Resilience and Security in Cameroon, 2019
Manu Lekunze
openaire +2 more sources
Manu Lekunze
openaire +2 more sources
2022
Chapter 5 focuses on case studies of small states’ pursuit of their goals in the realm of international security. Small states have long been understood to be particularly limited—even existentially threatened—in the security sphere. This chapter’s cases suggest significant variation in security outcomes for small states.
openaire +1 more source
Chapter 5 focuses on case studies of small states’ pursuit of their goals in the realm of international security. Small states have long been understood to be particularly limited—even existentially threatened—in the security sphere. This chapter’s cases suggest significant variation in security outcomes for small states.
openaire +1 more source
2006 IEEE Information Assurance Workshop, 2006
The information assurance (IA) model, an extension of the McCumber information security model, specifies security services for information when it is at rest, in transit, or being processed. According to the IA model, the processing information state is protected by technology, operations, and people security countermeasures. However, what has not been
openaire +1 more source
The information assurance (IA) model, an extension of the McCumber information security model, specifies security services for information when it is at rest, in transit, or being processed. According to the IA model, the processing information state is protected by technology, operations, and people security countermeasures. However, what has not been
openaire +1 more source
2010
AbstractThis article explores developments in the UK security state, concentrating on the intelligence and security services, together with the Whitehall machinery that connects these agencies with the core executive. It also addresses related aspects of security policing or ‘high policing’.
openaire +1 more source
AbstractThis article explores developments in the UK security state, concentrating on the intelligence and security services, together with the Whitehall machinery that connects these agencies with the core executive. It also addresses related aspects of security policing or ‘high policing’.
openaire +1 more source
Security Forum
The objective of the article is to present the state security system and indicate research and adaptation directions undertaken by scientists that shape the changing security conditions. It is claimed that the internal and external environment of the state security system is characterized by constant variability, which is of fundamental importance in ...
Łępicki, Jacek, Łępicki, Jacek
openaire +1 more source
The objective of the article is to present the state security system and indicate research and adaptation directions undertaken by scientists that shape the changing security conditions. It is claimed that the internal and external environment of the state security system is characterized by constant variability, which is of fundamental importance in ...
Łępicki, Jacek, Łępicki, Jacek
openaire +1 more source
From State Security to Human Security
SSRN Electronic Journal, 2007Today, many individuals are victims, not of foreign military aggression and nuclear war, but of violence committed against them by their own state. Moreover, the security of individuals is threatened, not by military forces, but by criminals and terrorists, the forces of nature, disease, and poverty.
openaire +2 more sources
This chapter attempts to explore the interaction between national sovereignty and private security companies, taking Myanmar and Cambodia as examples. After the end of the cold war, some countries are still in the process of State-building. To ensure domestic and international security, the authorities decided to take their security off the border and ...
Meng Yang, Yuhong Li
openaire +1 more source
Meng Yang, Yuhong Li
openaire +1 more source
Secure States versus Secure Executions
2013Several points of view exist about security policies among which two main approaches can be distinguished: policies can be defined by some properties over states of a system or by some properties over exe- cutions of a system. While enforcing a policy specified by some properties over states is rather easy, designing enforcement mechanisms to ensure ...
Jaume, Mathieu +3 more
openaire +2 more sources

