Zobrazeno 1 - 10
of 775
pro vyhledávání: '"security challenges"'
Autor:
Stepan Vaskiv
Publikováno v:
Three Seas Economic Journal, Vol 5, Iss 3 (2024)
The research highlights the objective need and the problems of assessing the development of cross-border co-operation in Ukraine, especially in the conditions of critical economic and social instability caused by a full-scale invasion and its consequ
Externí odkaz:
https://doaj.org/article/8ccbed5095a34500b6591ddd3a6aae83
Autor:
Miskeen E
Publikováno v:
International Journal of Women's Health, Vol Volume 16, Pp 737-747 (2024)
Elhadi Miskeen Department of Obstetrics and Gynaecology, College of Medicine, University of Bisha, Bisha, Saudi ArabiaCorrespondence: Elhadi Miskeen, Head Department of Obstetrics and Gynaecology, College of Medicine, University of Bisha, P.O. Box 12
Externí odkaz:
https://doaj.org/article/1cee272cc6e149bfb0ef93d9f3418546
Publikováno v:
Innovation, Social Responsibility and Sustainability
Publikováno v:
天地一体化信息网络, Vol 5, Pp 95-101 (2024)
This paper was commenced with an exploration of the system composition and security events of satellite Internet, conducted a comprehensive assessment of risks associated with entities such as satellites, terminals, ground stations, mission control,
Externí odkaz:
https://doaj.org/article/70a523ab6fac48b49e4c15e059792add
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 13, Iss 1, Pp 1-23 (2024)
Abstract Cloud computing provides outsourcing of computing services at a lower cost, making it a popular choice for many businesses. In recent years, cloud data storage has gained significant success, thanks to its advantages in maintenance, performa
Externí odkaz:
https://doaj.org/article/ae5e71bb16134b74a55772995ae03e0d
Autor:
Matić Goran D.
Publikováno v:
Politika nacionalne bezbednosti, Vol 26, Iss 1, Pp 145-164 (2024)
The beginning of the 21st century has brought about a large number of security and political problems at the regional and global levels, ranging from the unilateral recognition of the so-called "Kosovo", military intervention in Ukraine, Israel's mil
Externí odkaz:
https://doaj.org/article/63fdd42a3580405d8a513b15e8d56998
Autor:
Topalović Milica, Kolarski Ljiljana
Publikováno v:
Politika nacionalne bezbednosti, Vol 26, Iss 1, Pp 121-142 (2024)
Femicide, as the most extreme form of gender-based violence, has been highlighted as a special social and security problem in the Republic of Serbia in recent years. Statistical data support the fact that over a tenyear period, more than three hundre
Externí odkaz:
https://doaj.org/article/e22e3a8be68845508a6528746e9d761f
Autor:
Jyoti Bartakke, Rajeshkumar Kashyap
Publikováno v:
Journal of Information and Organizational Sciences, Vol 48, Iss 1, Pp 149-165 (2024)
Zero-trust security is a security model that assumes no entity is implicitly trusted, regardless of its origin or scope of access. This approach requires continuous verification of all users, devices, and applications before granting access to resour
Externí odkaz:
https://doaj.org/article/c4c5da33573c42f0afe98bf659ba07d1
Autor:
Shaukat, Reema
Publikováno v:
Defence Journal. 10/31/2024, Vol. 27 Issue 3, p87-87. 1p.
Publikováno v:
Frontiers in Computer Science, Vol 6 (2024)
The Internet of Things (IoT) is a collection of devices such as sensors for collecting data, actuators that perform mechanical actions on the sensor's collected data, and gateways used as an interface for effective communication with the external wor
Externí odkaz:
https://doaj.org/article/15f647620b854ef581d267b099564a47