Showing 1,941 - 1,960 results of 9,720 for search '"security"', query time: 0.10s Refine Results
  1. 1941

    Risk Assessment Maturity Level of Academic Information System Using ISO 27001 System Security Engineering-Capability Maturity Model by Nurbojatmiko Nurbojatmiko, Qurrotul Aini, Nabil Cahya Wasiqi, Muhammad Fitra Alfajri, Zahra Ulinnuha, Yuni Kurnia Purwati, Indah Kusuma Ayu, Natasya Aurora Yasmin

    Published 2024-06-01
    “…This research aims to determine the current level of Academic Information System (AIS) service by measuring maturity and security risks. Three clauses measure the maturity level of information security controls with the ISO 27001 System Security Engineering-Capability Maturity Model (SSE-CMM). …”
    Get full text
    Article
  2. 1942

    Threats and Challenges to The International Legal Order: Legal Problems Of Ensuring International Security in Modern Conditions (Some Conceptual Conclusions and Conclusions) by O. G. Paramuzova

    Published 2024-01-01
    “…This study is aimed at considering topical international legal problems of ensuring international security in the modern environment of environmental and nuclear law. …”
    Get full text
    Article
  3. 1943
  4. 1944
  5. 1945
  6. 1946
  7. 1947
  8. 1948
  9. 1949
  10. 1950
  11. 1951
  12. 1952
  13. 1953

    An Extended Interval Type-2 Fuzzy VIKOR Technique with Equitable Linguistic Scales and Z-Numbers for Solving Water Security Problems in Malaysia by Wan Nur Amira Wan Azman, Nurnadiah Zamri, Siti Sabariah Abas, Azimah Ismail, Zamali Tarmudi, Syibrah Naim, Lazim Abdullah

    Published 2023-01-01
    “…The obtained solutions would help decision makers (DMs) identify the best solution to enhance water security projects in terms of finding the best strategies for water supply security in Malaysia.…”
    Get full text
    Article
  14. 1954

    Three Mediating Pathways of Anxiety and Security in the Relationship between Coping Style and Disordered Eating Behaviors among Chinese Female College Students by Wenyue Han, Zheng Zheng, Ning Zhang

    Published 2021-01-01
    “…According to previous studies, eating disorders and disordered eating behaviors are associated with coping style, anxiety, and sense of security. However, the specific mechanism between them has not been elucidated. …”
    Get full text
    Article
  15. 1955
  16. 1956
  17. 1957

    A Secure User Authentication Scheme against Smart-Card Loss Attack for Wireless Sensor Networks Using Symmetric Key Techniques by Lei Chen, Fushan Wei, Chuangui Ma

    Published 2015-04-01
    “…User authentication in wireless sensor networks (WSNs) is a critical security issue due to their unattended and hostile deployment in the field. …”
    Get full text
    Article
  18. 1958
  19. 1959
  20. 1960