Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request

نتائج البحث

Filter
  • 1-5 ل  5 نتائج ل ""security policy""
Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Academic Journal

Enforcing policy-based security models for embedded SoCs within the internet of things

Subjects: access control; attack trees; SDLC

  • Source: Hagan , M , Siddiqui , F M , Sezer , S , Kang , B & McLaughlin , K 2019 , Enforcing policy-based security models for embedded SoCs within

تفاصيل العنوان

×
Academic Journal

MoTH: Mobile Terminal Handover Security Protocol for HUB Switching based on 5G and Beyond (5GB) P2MP Backhaul Environment

  • Source: Kim , J , Virgil Astillo , P , Sharma , V , Guizani , N & You , I 2021 , ' MoTH: Mobile Terminal Handover Security Protocol for HUB Switching based on 5G and Beyond

تفاصيل العنوان

×
Academic Journal

Embedded policing and policy enforcement approach for future secure IoT technologies

Subjects: FPGA; MPSoC; ARM TrustZone

  • Source: Siddiqui , F M , Hagan , M & Sezer , S 2018 , Embedded policing and policy enforcement approach for future secure IoT technologies . in Living in the Internet of Things:

تفاصيل العنوان

×

Critical international infrastructure: a case for secure, sustainable non-terrestrial networking

  • Source: Scott-Hayward , S 2024 , ' Critical international infrastructure: a case for secure, sustainable non-terrestrial networking ' GCSP Strategic Security Analysis , no. 35 .

تفاصيل العنوان

×

Securing AI-based Security Systems

  • Source: Scott-Hayward , S 2022 , ' Securing AI-based Security Systems ' GCSP Strategic Security Analysis , no. 25 . <

تفاصيل العنوان

×
  • 1-5 ل  5 نتائج ل ""security policy""