Zobrazeno 1 - 10
of 2 169
pro vyhledávání: '"Security threats"'
Publikováno v:
Journal of Financial Crime, 2024, Vol. 31, Issue 6, pp. 1485-1501.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/JFC-11-2023-0302
Autor:
Sergey K. Muravyev
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 4, Pp 44-55 (2024)
The subject of the article is plugins for optimizing compilers, which are connected through standard software interfaces provided to improve the functionality of such compilers and the efficiency of the software developed with their help. The purpose
Externí odkaz:
https://doaj.org/article/a603c8ec8c5442b88017f3b49593a62e
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 51, Iss 3, Pp 163-171 (2024)
Objective. The article considers the provisions of the fuzzy logic approach in relation to the method of quantifying the security of open operating systems (OS) of automated systems of the internal affairs bodies of the Russian Federation (AS of the
Externí odkaz:
https://doaj.org/article/e3a1fcc5786b410b8942131b2dd4373c
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 3, Pp 124-136 (2024)
The purpose of this article is to develop a model for an access control policy and to formulate a method for creating a model of information security threat scenarios in industrial control system (ICS). The results of developing an access control pol
Externí odkaz:
https://doaj.org/article/1dc0e7a55fa040fdbebdaad2eee16900
Publikováno v:
Information & Computer Security, 2023, Vol. 32, Issue 3, pp. 265-281.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/ICS-10-2022-0165
Autor:
Martin Zilvar
Publikováno v:
Obrana a Strategie, Vol 24, Iss 1, Pp 107-123 (2024)
As the Russia-Ukraine war constitutes the most severe security challenge Europe has faced since the Cold War's end, many states have realized the fragility of statehood, which an aggressor can destroy overnight. Although this concern is valid, it sho
Externí odkaz:
https://doaj.org/article/07a674350d5b48208dbf90eb4cf2ac37
Publikováno v:
Journal of Modern Science, Vol 56, Iss 2, Pp 727-748 (2024)
Climate change is currently one of the most important challenges faced by mankind. The purpose of this article is to give a coherent account of the scope and nature of these changes and their impact on universal security threats. The research process
Externí odkaz:
https://doaj.org/article/8190fcb62eb040b3baa473a91728a47d
Publikováno v:
Heliyon, Vol 10, Iss 15, Pp e35683- (2024)
Next generation electrical grid considered as Smart Grid has completely embarked a journey in the present electricity era. This creates a dominant need of machine learning approaches for security aspects at the larger scale for the electrical grid. T
Externí odkaz:
https://doaj.org/article/2730a138286e43bbac3ccfe1b5f25910
Autor:
AL-Nuaimi, Maryam Nasser
Publikováno v:
Global Knowledge, Memory and Communication, 2022, Vol. 73, Issue 1/2, pp. 1-23.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/GKMC-12-2021-0209
Autor:
Poornima Mahadevappa, Redhwan Al-amri, Gamal Alkawsi, Ammar Ahmed Alkahtani, Mohammed Fahad Alghenaim, Mohammed Alsamman
Publikováno v:
IoT, Vol 5, Iss 1, Pp 123-154 (2024)
Edge data analytics refers to processing near data sources at the edge of the network to reduce delays in data transmission and, consequently, enable real-time interactions. However, data analytics at the edge introduces numerous security risks that
Externí odkaz:
https://doaj.org/article/5ffd0fb441824dff958bbaa43a29d4b9