4.972   Artículos

« Anterior     Página: 1 de 249     Siguiente »

 
en línea
Kathleen Downer and Maumita Bhattacharya    
The prevalence and maturity of Bring Your Own Device (BYOD) security along with subsequent frameworks and security mechanisms in Australian organisations is a growing phenomenon somewhat similar to other developed nations. During the COVID-19 pandemic, e... ver más
Revista: Informatics    Formato: Electrónico

 
en línea
Bo Lu, Ruohan Cao, Luyao Tian, Hao Wang and Yueming Lu    
The integrated air-ground multi-domain network provides users with a set of shared infrastructures. Security policies can be defined flexibly in the context of multi-domain network semantics. The packet filter module in the security gateway can run effic... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
An?e Mihelic, Toma? Hovelja and Simon Vrhovec    
Different activities, artifacts, and roles can be found in the literature on the agile engineering of secure software (AESS). The purpose of this paper is to consolidate them and thus identify key activities, artifacts, and roles that can be employed in ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Andrei Popa, Julia Strer     Pág. 1384 - 1393
The events of 9/11 in the United States led to a significant strengthening of security measures within air transport. The maritime sector could also be a target of terror attacks. For this reason the International Convention for the Safety of Life at Sea... ver más
Revista: Transportation Research Procedia    Formato: Electrónico

 
en línea
Daniel Mara, Silviu Nate, Andriy Stavytskyy and Ganna Kharlamova    
The term ?energy security? is used almost everywhere in economic and political discussions related to energy supply. However, different authors use different meanings to express the concept of energy security. Quite often, this term is used to give more ... ver más
Revista: Energies    Formato: Electrónico

 
en línea
???? ?????????? ?????????     Pág. 100 - 108
The subject of the study is the issue of ensuring economic security. The purpose of the study is to study the evolutionary path of theoretical substantiation of the problem of ensuring economic security from the standpoint of security science. The articl... ver más

 
en línea
?arunas Grigaliunas, Michael Schmidt, Rasa Bruzgiene, Panayiota Smyrli and Vladislav Bidikov    
A surge in successful Information Security (IS) breaches targeting Research and Education (R&E) institutions highlights a pressing need for enhanced protection. Addressing this, a consortium of European National Research and Education Network (NREN) ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Anne M. Tall and Cliff C. Zou    
Controlling access to a large set of medical and social media data processed in a cloud environment using open-source Hadoop storage and Spark parallel processing.
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Réka Saáry, Ágnes Csiszárik-Kocsir and János Varga    
Security is considered a basic human need, according to Maslow?s hierarchy; however, it is hard to define exactly what the term means. Globalization, the digital environment, bring new dimensions and increasingly diverse interpretations of security to li... ver más
Revista: Sustainability    Formato: Electrónico

 
en línea
Moses Moyo and Marianne Loock    
The purpose of this study was to investigate security evaluation practices among small and medium enterprises (SMEs) in small South African towns when adopting cloud business intelligence (Cloud BI). The study employed a quantitative design in which 57 S... ver más
Revista: Information    Formato: Electrónico

 
en línea
Shawn Ingram, Ana-Maria Bogdan, Tayyab Shah, Xiaojing Lu, Meng Li, Michaela Sidloski and David Natcher    
The water?energy?food (WEF) nexus has emerged as a leading tool for assessing integrated resource management strategies and for monitoring progress towards the WEF-related Sustainable Development Goals. A notable outcome of WEF nexus research has been th... ver más
Revista: Sustainability    Formato: Electrónico

 
en línea
Javier Espinosa García, Luis Hernández Encinas and Alberto Peinado Domínguez    
Well-known international security frameworks try to eliminate or mitigate different kinds of risks on the assets covered by their scopes (e.g., people, goods, information, and reputation). To date, to the best of our knowledge, any of these approaches ne... ver más
Revista: Sustainability    Formato: Electrónico

 
en línea
Ivan Vaccari, Maurizio Aiello and Enrico Cambiaso    
The security of Internet of Things environments is a critical and trending topic, due to the nature of the networks and the sensitivity of the exchanged information. In this paper, we investigate the security of the Message Queue Telemetry Transport (MQT... ver más
Revista: Information    Formato: Electrónico

 
en línea
Calum C. Hall, Lynsay A. Shepherd and Natalie Coull    
Web applications are relied upon by many for the services they provide. It is essential that applications implement appropriate security measures to prevent security incidents. Currently, web applications focus resources towards the preventative side of ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Emmanuel C. Ogu, Olusegun A. Ojesanmi, Oludele Awodele and ?Shade Kuyoro    
Botnets have carved a niche in contemporary networking and cybersecurity due to the impact of their operations. The botnet threat continues to evolve and adapt to countermeasures as the security landscape continues to shift. As research efforts attempt t... ver más
Revista: Information    Formato: Electrónico

 
en línea
Duy Dang-Pham,Karlheinz Kautz,Siddhi Pittayachawan,Vince Bruno    
Behavioural information security (InfoSec) research has studied InfoSec at workplaces through the employees? perceptions of InfoSec climate, which is determined by observable InfoSec practices performed by their colleagues and direct supervisors. Prior s... ver más
Revista: Australasian Journal of Information Systems    Formato: Electrónico

 
en línea
Luigi Lo Iacono, Hoai Viet Nguyen and Peter Leo Gorski    
Contemporary software is inherently distributed. The principles guiding the design of such software have been mainly manifested by the service-oriented architecture (SOA) concept. In a SOA, applications are orchestrated by software services generally ope... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Vasileios Gkioulos, Gaute Wangen and Sokratis K. Katsikas    
Young generations make extensive use of mobile devices, such as smart-phones, tablets and laptops, for a variety of daily tasks with potentially critical impact, while the number of security breaches via portable devices increases exponentially. A pletho... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Bram Bonné, Gustavo Rovelo, Peter Quax and Wim Lamotte    
Smartphones and other mobile devices have proliferated in the past five years. The expectation of mobile device users to always be online has led to Wi-Fi networks being offered by a variety of providers. Using these networks introduces multiple security... ver más
Revista: Information    Formato: Electrónico

 
en línea
Vasileios Gkioulos, Gaute Wangen and Sokratis K. Katsikas    
Young generations make extensive use of mobile devices, such as smart-phones, tablets and laptops, for a variety of daily tasks with potentially critical impact, while the number of security breaches via portable devices increases exponentially. A pletho... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 249     Siguiente »