-
1دورية أكاديمية
المؤلفون: Wojciech Niewolski, Tomasz W. Nowak, Mariusz Sepczuk, Zbigniew Kotulski, Rafal Artych, Krzysztof Bocianiak, Jean-Philippe Wary
المصدر: Electronics; Volume 11; Issue 21; Pages: 3512
مصطلحات موضوعية: 5G mobile communication, communication system security, MEC, mobile computing, security context, SLA, security context migration, vertical industries
وصف الملف: application/pdf
العلاقة: Networks; https://dx.doi.org/10.3390/electronics11213512Test
-
2دورية أكاديمية
المؤلفون: United Nations
المصدر: Security Research Hub Reports
مصطلحات موضوعية: Political Stability, Security context, Haitian National Police, multi-national special force, funding
العلاقة: https://digitalcommons.fiu.edu/srhreports/state-stability-and-infrastructure/state-stability-and-infrastructure/331Test; https://amazonwatch.org/news/2023/0315-the-human-rights-obligations-of-the-peoples-republic-of-china-in-relation-to-business-activities-in-latin-americaTest
-
3دورية أكاديمية
المؤلفون: UN Security Council
المصدر: Security Research Hub Reports
مصطلحات موضوعية: Haitian National Police, current security context, deterioration in security
العلاقة: https://digitalcommons.fiu.edu/srhreports/humanTest-security/human-security/226; https://www.dni.gov/files/documents/GlobalTrends_2030.pdfTest
الإتاحة: https://digitalcommons.fiu.edu/srhreports/humanTest-security/human-security/226
https://www.dni.gov/files/documents/GlobalTrends_2030.pdfTest -
4مؤتمر
المساهمون: Centre National de la Recherche Scientifique (CNRS), Université de Rennes (UR), Confidentialité, Intégrité, Disponibilité et Répartition (CIDRE), CentraleSupélec-Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-SYSTÈMES LARGE ÉCHELLE (IRISA-D1), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique (IMT Atlantique), Institut Mines-Télécom Paris (IMT)-Institut Mines-Télécom Paris (IMT)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut Mines-Télécom Paris (IMT)-Institut Mines-Télécom Paris (IMT)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique (IMT Atlantique), Institut Mines-Télécom Paris (IMT)-Institut Mines-Télécom Paris (IMT), Service Expérimentation et Développement (SED Rennes ), Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique (IMT Atlantique), Laboratoire de Haute Sécurité (LHS - Inria), Institut National de Recherche en Informatique et en Automatique (Inria)-Direction générale de l'Armement (DGA), Université Grenoble Alpes (UGA), Commissariat à l'énergie atomique et aux énergies alternatives - Laboratoire d'Electronique et de Technologie de l'Information (CEA-LETI), Direction de Recherche Technologique (CEA) (DRT (CEA)), Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Commissariat à l'énergie atomique et aux énergies alternatives (CEA), Département Systèmes (DSYS), Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Direction de Recherche Technologique (CEA) (DRT (CEA))
المصدر: Fourth Workshop on Computer Architecture Research with RISC-V ; CARRV 2020 - Workshop on Computer Architecture Research with RISC-V ; https://hal.science/hal-03128242Test ; CARRV 2020 - Workshop on Computer Architecture Research with RISC-V, May 2020, Valence (virtual), Spain. pp.1-22
مصطلحات موضوعية: Side-channels, Hardware Security Context, Instruction Set Architecture, [INFO.INFO-AR]Computer Science [cs]/Hardware Architecture [cs.AR], [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
جغرافية الموضوع: Spain
الوقت: Valence (virtual), Spain
العلاقة: hal-03128242; https://hal.science/hal-03128242Test; https://hal.science/hal-03128242/documentTest; https://hal.science/hal-03128242/file/carrv.pdfTest
-
5
المؤلفون: Charles Morisset, Christopher Laing, Aad van Moorsel, Thomas Groß, James Turland, Iryna Yevseyeva, Lynne Coventry
المصدر: International Journal of Information Systems and Project Management, Vol 03, Iss 03, Pp 5-22 (2015)
مصطلحات موضوعية: lcsh:Management. Industrial management, Information Systems and Management, Operations research, business.industry, Strategy and Management, Bring your own device, Information technology, Context (language use), security, mitigation strategies, Security context, consumerization, Management Information Systems, Work (electrical), Risk analysis (engineering), lcsh:HD28-70, consumerisation, nudging, Position (finance), Information security policy, Sociology, business, risks
وصف الملف: application/pdf
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7cb37affeeda19e955458d8008a4989cTest
https://doi.org/10.12821/ijispm030301Test -
6
المؤلفون: Peter A Carter
المصدر: Pro SQL Server 2022 Administration ISBN: 9781484288634
Pro SQL Server 2019 Administration ISBN: 9781484250884
Pro SQL Server Administration ISBN: 9781484207116مصطلحات موضوعية: Computer science, business.industry, Sql server, Maintenance plan, Database administrator, Total cost of ownership, Computer security model, business, Security context, Software engineering, Automation, Scheduling (computing)
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cf524be0b6d603f8db591ab338754b13Test
https://doi.org/10.1007/978-1-4842-8864-1_23Test -
7
المصدر: Dynamics of Asymmetric Conflict. 14:259-281
مصطلحات موضوعية: Cultural Studies, Sociology and Political Science, Social Psychology, media_common.quotation_subject, Right wing extremism, Criminology, Security context, Rurality, Right wing, Political science, Political Science and International Relations, Ideology, Law, media_common
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::4f279b93359fd5a822cf74161bbd3b1aTest
https://doi.org/10.1080/17467586.2021.1876900Test -
8
المصدر: IEEE Access, Vol 9, Pp 156114-156150 (2021)
مصطلحات موضوعية: IoT, Blockchain, General Computer Science, business.industry, Computer science, Perspective (graphical), General Engineering, security, Security context, Data science, law.invention, TK1-9971, law, CLARITY, General Materials Science, Electrical engineering. Electronics. Nuclear engineering, business, Internet of Things, Financial services
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b23dc2aa202b13205fc4b03185c9f481Test
https://ieeexplore.ieee.org/document/9622256Test/ -
9
المؤلفون: Tom L. Roberts, Alan J. Burns, Clay Posey
المصدر: Information Systems Frontiers. 23:343-360
مصطلحات موضوعية: Computer Networks and Communications, Repertoire, 05 social sciences, 02 engineering and technology, Information security, Security context, Computer security, computer.software_genre, Theoretical Computer Science, Insider, Resource (project management), Extended model, 020204 information systems, 0502 economics and business, 0202 electrical engineering, electronic engineering, information engineering, Information system, 050211 marketing, Business, Set (psychology), computer, Software, Information Systems
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::8b6b7766cb1a09e389008968bf2c4ef9Test
https://doi.org/10.1007/s10796-019-09951-9Test -
10
المؤلفون: Sandip Ghosal, R. K. Shyamasundar
المصدر: ICSE (NIER)
مصطلحات موضوعية: FOS: Computer and information sciences, Computer Science - Programming Languages, Computer Science - Cryptography and Security, Correctness, Computer science, Programming language, Control (management), Axiomatic system, Context (language use), Security context, computer.software_genre, Timing attack, TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS, Concurrent computing, Sleep (system call), Cryptography and Security (cs.CR), computer, Programming Languages (cs.PL)
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7fb6b4e3c51e5bf5e2bdc19469a9e2bbTest
https://doi.org/10.1109/icse-nier52604.2021.00015Test