Zobrazeno 1 - 10
of 1 148
pro vyhledávání: '"Security Framework"'
Autor:
Hussain M. Mustafa, Sajan K. Sadanandan, Anurag K. Srivastava, Arif R. Sarwari, Rebecca Reece
Publikováno v:
IEEE Access, Vol 12, Pp 175338-175356 (2024)
Despite being man-made, cyber-power systems and the associated cyber-attacks evolve in tandem with human expertise, which matures over time. This dynamic mirrors the evolutionary processes observed in infectious disease ecology within microbial and h
Externí odkaz:
https://doaj.org/article/208c0eeabbe047e39d3c8b1b2d6b62c8
Publikováno v:
IEEE Access, Vol 12, Pp 157924-157944 (2024)
The increasing use of Internet of Things (IoT) devices in critical sectors has increased exposure to security threats, making protecting these systems a priority challenge. Based on static configurations, traditional security approaches have proven i
Externí odkaz:
https://doaj.org/article/914e946b16f84c93b3ec8bc219f70da6
Publikováno v:
IEEE Access, Vol 12, Pp 74343-74366 (2024)
Neighbourhood watch is a concept allowing a community to distribute a complex security task in between all members. Members carry out security tasks in a distributed and cooperative manner ensuring their mutual security and reducing the individual wo
Externí odkaz:
https://doaj.org/article/def13f12a6cd4bbf80797cbf4fa512ff
Publikováno v:
Tehnički Vjesnik, Vol 31, Iss 1, Pp 48-55 (2024)
The rapid expansion of the Internet of Things (IoT) has led to increased concerns regarding the security of IoT systems. Attacks targeting IoT devices, such as code injection and code reuse, have become more sophisticated, compromising device control
Externí odkaz:
https://doaj.org/article/99ec5b4824474452bbf84f38e003413a
Publikováno v:
IEEE Access, Vol 12, Pp 36296-36310 (2024)
The rise of smart cities, smart homes, and smart health powered by the Internet of Things (IoT) presents significant challenges in design, deployment, and security. The seamless data processing across a complex network of interconnected devices in un
Externí odkaz:
https://doaj.org/article/a202f20b860e453d9321460c39692d02
Autor:
Sangjun Lee, Dongsu Kang
Publikováno v:
IEEE Access, Vol 12, Pp 3488-3498 (2024)
Effective education and training of cyber professionals have been proposed as key national tasks to strengthen cybersecurity. However, traditional training does not include modeling and simulation procedure for training cyber operation. This study de
Externí odkaz:
https://doaj.org/article/efc6b0e81bd84d4482da0226c922265d
Autor:
Bengü Çelenk
Publikováno v:
Güvenlik Stratejileri Dergisi, Vol 19, Iss 46, Pp 537-560 (2023)
Climate change is a multifaceted and comprehensive issue addressed through its direct and threat multiplier effects. In the relevant literature, climate change’s direct and threat multiplier effects are studied through human, national, and internat
Externí odkaz:
https://doaj.org/article/7b085fc2fd934c97835872aa1bfd14ca
Publikováno v:
Ethiopian Journal of the Social Sciences and Humanities, Vol 18, Iss 2, Pp 119-143 (2023)
The purpose of this article is to examine the normative and institutional constraints that exist within the Inter-Governmental Authority on Development's (IGAD) peace and security frameworks. Despite IGAD's broad mandate to maintain regional peace an
Externí odkaz:
https://doaj.org/article/b5f595e59f1b48faad4baa6006d28aa6
Publikováno v:
Nongye tushu qingbao xuebao, Vol 35, Iss 4, Pp 79-89 (2023)
[Purpose/Significance] Smart libraries are an important component of the construction plan for the public cultural system for the smart society and at the national level. However, in the development process of smart libraries, there are security issu
Externí odkaz:
https://doaj.org/article/313dbd6231b24550bcd476538a91d5a6
Publikováno v:
IEEE Access, Vol 11, Pp 131836-131847 (2023)
Many-core Systems-on-Chip (MCSoC) are increasingly used in various applications domains such as high-performance computing, embedded systems, and Internet of Things devices. As MCSoCs permeate various industries and applications, the potential conseq
Externí odkaz:
https://doaj.org/article/3a7eb5bde5634a07b7360ceeb3218b42