|
|
|
Tomasz Janus, Mateusz Skomra and Marcin Dziubinski
-
|
|
|
|
|
|
|
Tomasz Janus, Mateusz Skomra and Marcin Dziubinski
Networks are beneficial to those being connected but can also be used as carriers of contagious hostile attacks. These attacks are often facilitated by exploiting corrupt network users. To protect against the attacks, users can resort to costly defense. ...
ver más
|
|
|
|
|
|
|
Tianhong Chen and John A. Turner
|
|
|
|
|
|
|
Javier Núñez, Ximena Tocornal, Pablo Henríquez
Pág. Pág. 87 - 120
La percepción de seguridad de los habitantes en sus entornos residenciales más inmediatos se nutre de diversos factores tanto personales como del territorio y de las relaciones sociales entre vecinos. Este trabajo explora mediante el método estadístico d...
ver más
|
|
|
|
|
|
|
Bika B. Dzhamalova,Guseyn B. Magomedov,Amirkhan A. Amirkhanov,Pati K. Ramazanova,Bigruzi B. Suleymanov
Pág. 383 - 389
Security of personality is not only a set of specific measures to ensure its protection from various dangers, but a condition of being protected, which is based on the ability to self-manage one?s own behavior. The aim of the article is to identify the a...
ver más
|
|
|
|
|
|
|
Fred Hebein
The complex rules and inter-related choices regarding spousal and survivor benefits imbedded in the social security system make the optimization of lifetime benefits for married couples a complex decision which can reduce or increase lifetime benefits si...
ver más
|
|
|
|
|
|
|
Mohammad Ishfaq, Heitham Al-Hajieh and Majed Alharthi
The quality of work life (QWL), job satisfaction, and individual work performance are the lynchpins of organizational performance and sustained business growth (SBG). Numerous researchers have recognized an association between QWL and SBG. Positive QWL d...
ver más
|
|
|
|
|
|
|
Lina Röschel, Frieder Graef, Ottfried Dietrich, Meike Pendo Schäfer and Dagmar Haase
Climatic and environmental changes are expected to affect in particular those regions where the economy is primarily based on the agricultural sector and where the dependency on water availability is high. This study examines how smallholder farmers in r...
ver más
|
|
|
|
|
|
|
Ningning Liu, Danfeng Xie, Changlong Wang and Yun Bai
Scholars have paid considerable attention to the factors that affect the safety states of construction workers. However, only a few studies have focused on the safety assessment and security alerts of individual workers. In this study, the term ?frequenc...
ver más
|
|
|
|
|
|
|
Mario Noseda, Lea Zimmerli, Tobias Schläpfer and Andreas Rüst
New protocol stacks provide wireless IPv6 connectivity down to low power embedded IoT devices. From a security point of view, this leads to high exposure of such IoT devices. Consequently, even though they are highly resource-constrained, these IoT devic...
ver más
|
|
|
|
|
|
|
Satoshi Yazawa, Kikue Sakaguchi and Kazuo Hiraki
Advances in web technology and the widespread use of smartphones and PCs have proven that it is possible to optimize various services using personal data, such as location information and search history. While considerations of personal privacy and legal...
ver más
|
|
|
|
|
|
|
Miroslava Krstic, Vladimir Obradovic, Zorica Terzic-Supic, Dejana Stanisavljevic; Jovana Todorovic
Pág. 33 - 43
Reserarch question: This paper investigates whether motivational factors have influence on the work of employees in health care organizations of Serbia and what factors affect employees. Motivation: Motivation and job satisfaction among different gr...
ver más
|
|
|
|
|
|
|
Diego Ignacio Rodríguez Ignacio Rodríguez, Gustavo Anríquez, José Luis Riveros
Pág. 5 - 15
The main hurdle to achieving food security in Latin America and the Caribbean is the inability of many poor families to access the foods necessary for a healthy diet, in a context in which food prices and family incomes are fundamental determinants. Anim...
ver más
|
|
|
|
|
|
|
Ludwig Slusky, Parviz Partow-Navid
Cyber security threats, systems vulnerabilities, privacy concerns, and other security developments are progressing and proliferating rapidly. This article describes experience accumulated in teaching an online Information Assurance course at a 4-year co...
ver más
|
|
|
|
|
|
|
Jianjun Wu, Yuxue Hu, Zhongqiang Huang, Junsong Li, Xiang Li and Ying Sha
Link prediction is a critical prerequisite and foundation task for social network security that involves predicting the potential relationship between nodes within a network or graph. Although the existing methods show promising performance, they often i...
ver más
|
|
|
|
|
|
|
Maya Hilda Lestari Louk and Bayu Adhi Tama
As a system capable of monitoring and evaluating illegitimate network access, an intrusion detection system (IDS) profoundly impacts information security research. Since machine learning techniques constitute the backbone of IDS, it has been challenging ...
ver más
|
|
|
|
|
|
|
Linus Zhang and Xiaoliu Yang
Given the substantial impacts that are expected due to climate change, it is crucial that accurate rainfall?runoff results are provided for various decision-making purposes. However, these modeling results often generate uncertainty or bias due to the im...
ver más
|
|
|
|
|
|
|
Linus Zhang and Xiaoliu Yang
Given the substantial impacts that are expected due to climate change, it is crucial that accurate rainfall?runoff results are provided for various decision-making purposes. However, these modeling results often generate uncertainty or bias due to the im...
ver más
|
|
|
|
|
|
|
Yury Yanovich, Igor Shiyanov, Timur Myaldzin, Ivan Prokhorov, Darya Korepanova and Sergey Vorobyov
Counterfeit and unaccounted postage stamps used on mailings cost postal administrations a significant amount of money each year. Corporate and individual clients become victim to stamp fraud and incur losses when security teams investigate such mailings....
ver más
|
|
|
|
|
|
|
Frank Ato Ghansah and David John Edwards
Despite the growing rich and fragmented literature focusing on quality assurance (QA) and Industry 4.0, the implementation of associated individual digital technologies has not been fully evaluated and synthesised to achieve adequate QA in the constructi...
ver más
|
|
|
|