Results 251 to 260 of about 19,943 (307)
Assessment of urban seismic social vulnerability based on game theory combination and TOPSIS model: a case study of Changchun City. [PDF]
Ma M+5 more
europepmc +1 more source
Optimizing data privacy and security measures for critical infrastructures via IoT based ADP2S technique. [PDF]
Xu Z+6 more
europepmc +1 more source
Characteristics of Medical Cannabis Patients and Clinicians in 7 US States.
Boehnke KF+4 more
europepmc +1 more source
Computer network vulnerabilities and monitoring [PDF]
This paper presents an overview of the current computer network vulnerabilities and exploits, possibilities of monitoring the network traffic, by intercepting and duplicating it, ways of analyzing the monitored traffic in order to better understand and explain the detection of user's behavior.
Victor Croitoru+2 more
openaire +1 more source
Cloud Computing Vulnerabilities Analysis [PDF]
Nowadays cloud computing technologies are the most widely used tools due to their great flexibility and also to their lower maintenance costs. Many vendors of cloud computing have appeared on the market for each type of cloud. These solutions still pose certain vulnerabilities and work to improve the security of cloud computing technologies. We analyze
Alin Zamfiroiu, Radu Boncea, Ionut Petre
openaire +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Understanding Cloud Computing Vulnerabilities
IEEE Security & Privacy Magazine, 2011The current discourse about cloud computing security issues makes a well-founded assessment of cloud computing's security impact difficult for two primary reasons. First, as is true for many discussions about risk, basic vocabulary such as "risk," "threat," and "vulnerability" are often used as if they were interchangeable, without regard to their ...
E Stocker, B Grobauer, T Walloschek
openaire +2 more sources
Computer unreliability and social vulnerability
Futures, 1990Abstract Many have argued that industrial societies are becoming more technology-dependent and are thus more vulnerable to technology failures. Despite the pervasiveness of computer technology, little is known about computer failures, except perhaps that they are all too common.
Perry R. Morrison, Tom Forester
openaire +2 more sources