Showing 361 - 380 results of 5,943 for search '"security"', query time: 0.09s Refine Results
  1. 361
  2. 362
  3. 363
  4. 364

    Governmental approaches to food security management: A bibliometric analysis by Eldar Guliyev, Bayali Atashov, Aygun Guliyeva

    Published 2024-07-01
    “…The analysis showed an exponential increase in the number of publications since 2000, with peaks in 2008 (financial crisis), 2019–2020 (COVID-19), and 2023 (threat to food security due to military conflicts). The clustering of scientific papers by content showed that the most significant (red) cluster unites research that links food security to agricultural development, sustainable development, climate change, and water supply. …”
    Get full text
    Article
  5. 365
  6. 366
  7. 367
  8. 368

    A Cooperative Model for IS Security Risk Management in Distributed Environment by Nan Feng, Chundong Zheng

    Published 2014-01-01
    “…Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. …”
    Get full text
    Article
  9. 369
  10. 370
  11. 371
  12. 372
  13. 373

    Logic-Based Security Architecture for Systems Providing Multihop Communication by Iman Almomani, Eman Al-Banna, Mousa AL-Akhras

    Published 2013-01-01
    “…Security is a basic element of distributed systems such as ad hoc and sensor communication networks. …”
    Get full text
    Article
  14. 374
  15. 375
  16. 376
  17. 377

    A Resilience-Based Security Assessment Approach for CBTC Systems by Ruiming Lu, Huiyu Dong, Hongwei Wang, Dongliang Cui, Li Zhu, Xi Wang

    Published 2021-01-01
    “…The CBTC system ensures safe and efficient operation of trains, so the quantitative assessment of cyber security is quite necessary. In this paper, a resilience-based assessment method is proposed to analyze the security level of CBTC systems based on indicators of both the cyber domain and the physical domain. …”
    Get full text
    Article
  18. 378
  19. 379

    An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment by Sudha Devi Dorairaj, Thilagavathy Kaliannan

    Published 2015-01-01
    “…Since the data needs to be secured throughout its life cycle, security of the data in cloud is a major challenge to be concentrated on because the data is in third party’s premises. …”
    Get full text
    Article
  20. 380