Results 1 to 10 of about 1,017,053 (308)

CHALLENGES OF IMPLEMENTATION OF STATE SECURITY SERVICES [PDF]

open access: yesZeszyty Naukowe Wyższej Szkoły Finansów i Prawa w Bielsku-Białej, 2014
In the process of managing the country, it is advisable to look at broader measures of public administration in the implementation of specific national security services implemented to ensure existential and behavioral needs of society.
Marek Zbigniew KULISZ
doaj   +15 more sources

THE CORRELATION OF THE CONCEPTS “NATIONAL SECURITY” AND “STATE SECURITY” IN LAW. THE PLACE OF THE FEDERAL SECURITY SERVICE OF RUSSIA IN ENSURING STATE SECURITY

open access: yesПравовое государство: теория и практика
The analysis of the legal basis of the activities of the bodies of the Federal Security Service of the Russian Federation (hereinafter – the FSB of Russia), in particular the security objects in their view, requires a clear understanding of each key
YUSUPOV Rakhimian Galimianovich   +1 more
doaj   +2 more sources

Mathematical model for controlling CO2 concentration in greenhouses late in MATLAB [PDF]

open access: yesMATEC Web of Conferences, 2019
The article is devoted to the development of an automated control system for irradiation facilities. The system will optimize the electricity cost for supplementary lighting plants in greenhouses without economic losses. A number of scientific researches
Ivliev Sergey N.   +3 more
doaj   +1 more source

Neural network identification of a nonlinear model of a high-pressure sodium lamp [PDF]

open access: yesMATEC Web of Conferences, 2020
The article is devoted to the identification of a high-pressure sodium lamp nonlinear model parameters based on neural network technologies. Identification was carried out using a dynamic neural network.
Semenov Anatolij D.   +2 more
doaj   +1 more source

NSFuzz: Towards Efficient and State-Aware Network Service Fuzzing

open access: yesACM Transactions on Software Engineering and Methodology, 2023
As an essential component responsible for communication, network services are security critical, thus, it is vital to find their vulnerabilities. Fuzzing is currently one of the most popular software vulnerability discovery techniques, widely adopted due
Shisong Qin   +5 more
semanticscholar   +1 more source

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges [PDF]

open access: yesIEEE Communications Surveys and Tutorials, 2021
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-ground integrated network environment, novel technologies, and an accessible user information explosion.
V. Nguyen   +4 more
semanticscholar   +1 more source

Internet of Things (IoT) Security With Blockchain Technology: A State-of-the-Art Review

open access: yesIEEE Access, 2022
With the rapid enhancement in the design and development of the Internet of Things creates a new research interest in the adaptation in industrial domains.
A. Khan   +4 more
semanticscholar   +1 more source

Software Defined Security Service Provisioning Framework for Internet of Things [PDF]

open access: yesarXiv.org, 2017
Programmable management framework have paved the way for managing devices in the network. Lately, emerging paradigm of Software Defined Networking (SDN) have rev-olutionized programmable networks. Designers of networking applications i.e.
F. Khan, S. Hameed
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy