Buscar
Mostrando ítems 1-10 de 9200
Security in smart objects, a general view at the physical and logical level
(Editorial de la Universidad Tecnica del Norte, 2019)
Model-based development of security requirements
(Centro Latinoamericano de Estudios en Informática, 2011)
Foreign direct investment and security: simplifying the complexities
(2016-12-14)
The relationship between foreign direct investment and the security situation of a given country is complex and difficult to define. To further complicate matters, security is only one of many variables that drives the ...
Market-driven security-constrained transmission network expansion planning
(2011-05-31)
This paper presents a Bi-level Programming (BP) approach to solve the Transmission Network Expansion Planning (TNEP) problem. The proposed model is envisaged under a market environment and considers security constraints. ...
Market-driven security-constrained transmission network expansion planning
(2011-05-31)
This paper presents a Bi-level Programming (BP) approach to solve the Transmission Network Expansion Planning (TNEP) problem. The proposed model is envisaged under a market environment and considers security constraints. ...
Security and defence policy documents: a new dataset
(2021)
Security and defence policy documents have sparked academic interest since their publication has become a common international practice in the 1990s. Yet, broad comparisons across time and countries have been scarce. This ...
Formal validation of automated policy refinement in the management of network security systems
(SPRINGER, 2010)
Policy hierarchies and automated policy refinement are powerful approaches to simplify administration of security services in complex network environments. A crucial issue for the practical use of these approaches is to ...
Proposed Model to Implement High-Level Information Security in Internet of Things
(Ieee, 2017-01-01)
Internet of Things (IoT) connect different types of devices to control different things or simply read data from then, such as room temperature, location, pressure and others, in a variety of application domains using the ...