Zobrazeno 1 - 10
of 2 390
pro vyhledávání: '"Threat model"'
Autor:
Chaudhury, Swati, Gupta, Aditi, Nair, Kiran, Vats, Apoorva, Chaudhuri, Ranjan, Hussain, Zahid, Chatterjee, Sheshadri
Publikováno v:
International Journal of Law and Management, 2024, Vol. 66, Issue 5, pp. 602-623.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/IJLMA-01-2024-0011
Autor:
Shimaa A. Abdel Hakeem, HyungWon Kim
Publikováno v:
Alexandria Engineering Journal, Vol 85, Iss , Pp 160-176 (2023)
Security concerns in 5 G-V2X communication, including message authenticity, entity identification, and efficient malicious entity detection, necessitate innovative solutions. This paper introduces a novel protocol aimed at addressing security challen
Externí odkaz:
https://doaj.org/article/94e7a95768a64402bc0dc2ac2b4b3222
Publikováno v:
Journal of Knowledge Management, 2022, Vol. 27, Issue 2, pp. 485-505.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/JKM-03-2021-0223
Publikováno v:
IEEE Access, Vol 11, Pp 137083-137098 (2023)
The clinical environment is one of the most important sources of sensitive patient data in healthcare. These data have attracted cybercriminals who pursue the theft of this information for personal gain. Therefore, protecting these data is a critical
Externí odkaz:
https://doaj.org/article/b5c31459183042b3af0d8ea8dc783c58
Publikováno v:
Безопасность информационных технологий, Vol 29, Iss 4, Pp 42-52 (2022)
When building multi-level information protection both in the public and in the private sector, it is necessary to take the measures aimed at preventing threats to information security. Cyberphysical systems, as a means of communication, are actively
Externí odkaz:
https://doaj.org/article/35dfe55111b44695adb8d2a858936809
Publikováno v:
Mathematics, Vol 11, Iss 23, p 4856 (2023)
With the rapid growth of the software industry, the software supply chain (SSC) has become the most intricate system in the complete software life cycle, and the security threat situation is becoming increasingly severe. For the description of the SS
Externí odkaz:
https://doaj.org/article/31133f27f8a948cf88f3965872a419da
Publikováno v:
Sensors, Vol 23, Iss 23, p 9500 (2023)
The modernization of logistics through the use of Wireless Sensor Network (WSN) Internet of Things (IoT) devices promises great efficiencies. Sensor devices can provide real-time or near real-time condition monitoring and location tracking of assets
Externí odkaz:
https://doaj.org/article/b2373e7b5d3a40d9a735228c06566941
Publikováno v:
Frontiers in Psychology, Vol 14 (2023)
PurposePrevious research conducted on the Job Demands-Resources model has mostly ignored the newly introduced Challenge-Hindrance-Threat distinction of workplace stressors. Thus, to better understand the nature of job demands, the present study aimed
Externí odkaz:
https://doaj.org/article/7d217b20cd6b4c198f93700423a7351e
Publikováno v:
IEEE Access, Vol 10, Pp 133256-133278 (2022)
Vehicular Fog Computing (VFC) facilitates the deployment of distributed, latency-aware services, residing between smart vehicles and cloud services. However, VFC systems are exposed to manifold security threats, putting human life at risk. Knowledge
Externí odkaz:
https://doaj.org/article/075f5d1cb8244814a02848b4f80013f1
Publikováno v:
International Journal of Technology, Vol 12, Iss 7, Pp 1407-1416 (2021)
The economic and social infrastructure of countries is improving under the growing influence of digital transformation, within which unmanned transportation technologies are being developed. The increased risks involve the driverless vehicle cont
Externí odkaz:
https://doaj.org/article/3fea0cdec30c4c5da5600b6d4638868c