ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Technology
Geography
Research
Social Sciences
Environment
Computing
Education
Economy
Computing
Architecture and Urbanism
all records (61)

Languages
English
Spanish
Portuguese

Countries
Brazil
USA
Indonesia
South Africa
Italy
Switzerland
Romania
Australia
Cuba
Spain
all records (44)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (20)

Filter  
 
559  Articles
1 of 57 pages  |  10  records  |  more records»
Until recently, Industrial Automation and Control Systems (IACS) were largely isolated from corporate systems by means of proprietary protocols, which facilitated their protection against cyber-attacks under the principle of security through obscurity. Ho... see more

This investigation analyses the history of the vulnerabilities of the base system Windows Server 2012 highlighting the most critic vulnerabilities given every 4 months since its creation until the current date of the research. It was organized by the type... see more

Study this aim for analyze and identify vulnerability existing security on AB and XY Service Websites in East Java. Contribution study this is give more understanding deep about type vulnerability specific security and its impact to field website security... see more

Coronavirus belongs to the ARI (Acute Respiratory Infection) disease, which has a high level of mortality risk. In 2019, this virus was transformed into Covid-19 with a rapid spread and a more massive impact. This disease has become a worldwide pandemic. ... see more

Information systems provide ease in creating transparency and process management. This advantage becomes the basis of department xyz reference to build a web-based information system to manage student thesis, and implement security features on web applica... see more

Objective: to unveil the vulnerabilities of homeless women linked to the social markers of gender and race/color. Methods: qualitative study, developed with ten homeless women through participant observation, field diary, and sociodemographic questionnair... see more

Abstract: This article discusses digitization weaknesses, biases, and malfunctions to challenge popular, almost hegemonic visions of contemporary technologies. By focusing on examples provided by recent mediated cases, controversies, and critical research... see more

Objective: to unveil the vulnerabilities of homeless women linked to the social markers of gender and race/color. Methods: qualitative study, developed with ten homeless women through participant observation, field diary, and sociodemographic questionnair... see more

1 of 57 pages  |  10  records  |  more records»