Zobrazeno 1 - 10
of 3 836
pro vyhledávání: '"Security assessment"'
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 51, Iss 3, Pp 163-171 (2024)
Objective. The article considers the provisions of the fuzzy logic approach in relation to the method of quantifying the security of open operating systems (OS) of automated systems of the internal affairs bodies of the Russian Federation (AS of the
Externí odkaz:
https://doaj.org/article/e3a1fcc5786b410b8942131b2dd4373c
Publikováno v:
International Journal of Structural Integrity, 2024, Vol. 15, Issue 5, pp. 1027-1050.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/IJSI-06-2024-0079
Autor:
Angunthip Srisuwan
Publikováno v:
Journal of Urban Management, Vol 13, Iss 3, Pp 456-468 (2024)
Urban water security is a multi-faceted water, socioeconomic, and governance challenge. The complexity of translating the holistic approach into policies is an important need for improving water resource management to achieve prosperity, equity, sust
Externí odkaz:
https://doaj.org/article/6727d21e568d43a3ba45f82e62869632
Publikováno v:
Frontiers in Environmental Science, Vol 12 (2024)
The development of mining cities has led to changes in land use and the evolution of landscape patterns. Constructing an ecological security evaluation system can reflect the ecological security status of mining city areas and provide planning refere
Externí odkaz:
https://doaj.org/article/a8e5409385104438880c351415b3431d
Collaborative security assessment of cloud-edge-device distributed systems based on order parameters
Publikováno v:
网络与信息安全学报, Vol 10, Pp 38-51 (2024)
Distributed computing systems based on cloud-edge-device have been successfully serving thousands of applications and have become mainstream, characterized by a wide audience, high user experience requirements, and high security expectations. However
Externí odkaz:
https://doaj.org/article/16b436b91de9463898692d50a30e66a9
Collaborative security assessment of cloud-edge-device distributed systems based on order parameters
Publikováno v:
网络与信息安全学报, Vol 10, Iss 3, Pp 38-51 (2024)
Distributed computing systems based on cloud-edge-device have been successfully serving thousands of applications and have become mainstream, characterized by a wide audience, high user experience requirements, and high security expectations. However
Externí odkaz:
https://doaj.org/article/769dda6cf8ce4a3282921393c177dcbc
Autor:
Juan Pablo Perata, Gustavo Betarte
Publikováno v:
CLEI Electronic Journal, Vol 27, Iss 4 (2024)
This paper presents the results of a security assessment of FIWARE technology. We adopted an offensive perspective to identify vulnerabilities in deploying FIWARE components in specific architecture configurations. We identify security issues by expe
Externí odkaz:
https://doaj.org/article/c029d118ff034afa8e5e4f1d8ab7dac9
Publikováno v:
International Journal of Electrical Power & Energy Systems, Vol 160, Iss , Pp 110141- (2024)
With the current trend, the power generation in the future power grids is expected to consist of a large number of converter-interfaced generations (CIGs) with a small percentage of synchronous generators (SGs) producing power from hydro, solar therm
Externí odkaz:
https://doaj.org/article/99cad3fb72be48ce957e3ded0e5748f0
Publikováno v:
International Journal of Intelligent Computing and Cybernetics, 2023, Vol. 17, Issue 1, pp. 38-60.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/IJICC-05-2023-0121
Publikováno v:
Frontiers in Energy Research, Vol 12 (2024)
With the gradual increase in the grid-connected capacity of renewable energy sources, the uncertainty in the operation of power systems has increased, posing challenges to static security assessment considering N-1 contingency scanning. To address th
Externí odkaz:
https://doaj.org/article/3213aadc42424824b66bd7c4d6df6e35