UP - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UPUK. Za polni dostop se PRIJAVITE.

1 2 3
zadetkov: 27
1.
  • An Empirical Analysis to Un... An Empirical Analysis to Understand Consumer Intention to Use Mobile Payment Platform: The Mediating Role of Trust
    Gill, Atif Ali; Ansari, Riaz Hussain; Malik, Zobia ... Journal of Business and Social Review in Emerging Economies, 03/2021, Letnik: 7, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Purpose: Money transfer through third-party mobile payment platforms has become common nowadays in western countries. While in developing countries, the adoption of mobile payment channels still at ...
Celotno besedilo

PDF
2.
  • A mutation-based approach f... A mutation-based approach for the formal and automated analysis of security ceremonies
    Sempreboni, Diego; Viganò, Luca Journal of computer security, 01/2023, Letnik: 31, Številka: 4
    Journal Article
    Recenzirano

    There is an increasing number of cyber-systems (e.g., systems for payment, transportation, voting, critical infrastructures) whose security depends intrinsically on human users. In this paper, we ...
Celotno besedilo
3.
  • EFFECTIVENESS OF PREVENTIVE... EFFECTIVENESS OF PREVENTIVE SECURITY MEASURES AND CRIMINAL ACTS AGAINST CIVIL AVIATION
    KORECKI, Zbyšek; HOIKA, Tomáš Problemy Transportu, 06/2022, Letnik: 17, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    The development of measures in civil aviation protection against illegal acts is based on the analysis of incidents, which can be divided into four development stages. Before 9/11, civil aviation ...
Celotno besedilo
4.
Celotno besedilo
5.
  • Out to explore the cybersec... Out to explore the cybersecurity planet
    Bella, Giampaolo Journal of intellectual capital, 05/2020, Letnik: 21, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    PurposeSecurity ceremonies still fail despite decades of efforts by researchers and practitioners. Attacks are often a cunning amalgam of exploits for technical systems and of forms of human ...
Celotno besedilo

PDF
6.
  • Methodological approach to ... Methodological approach to development and implementation of the Small Nuclear Power Plants program
    Semenov, Victor; Shchepetina, Tatiana; Polevanov, Vladimir ... E3S Web of Conferences, 01/2021, Letnik: 289
    Journal Article, Conference Proceeding
    Recenzirano
    Odprti dostop

    The article considers perspectives and institutions for innovative nuclear energy subsector – a small and medium-sized nuclear power plants (SNP). The features of the technologies, prospective sites ...
Celotno besedilo

PDF
7.
  • Contemporary aspects of sur... Contemporary aspects of surveillance and control carried out by technical security
    Gerasimoski, Saše Bezbednosni dijalozi, 2017, Letnik: 8, Številka: 1-2
    Journal Article
    Odprti dostop

    Private security has developed significantly throughout the world in the past few decades. Technical security has also flourished, bringing new technologies of surveillance and control that became ...
Celotno besedilo

PDF
8.
  • AN ANALYSIS OF TECHNICAL SE... AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS
    SONG, JAE-GU; LEE, JUNG-WOON; PARK, GEE-YONG ... Nuclear engineering and technology, 10/2013, Letnik: 45, Številka: 5
    Journal Article
    Recenzirano
    Odprti dostop

    Instrumentation and control systems in nuclear power plants have been digitalized for the purpose of maintenance and precise operation. This digitalization, however, brings out issues related to ...
Celotno besedilo

PDF
9.
  • LNG bunkering pontoons on i... LNG bunkering pontoons on inland waters in China
    Fan, Hongjun; Xu, Jianyong; Wu, Shunping ... Natural Gas Industry B, 03/2018, Letnik: 5, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    LNG bunkering pontoons are presented to solve the fueling difficulty of LNG ships on inland waterways with a great variation of water height and channel width by seasonal change. First, the ...
Celotno besedilo

PDF
10.
  • FALSE ALARMS OF THE CONTACT... FALSE ALARMS OF THE CONTACT GLASS-BREAK DETECTORS CAUSED BY THE MULTI-CHAMBER WINDOW
    Mach, Vaclav; Adamek, Milan; Drofova, Irena ... Annals of DAAAM & proceedings, 01/2020
    Journal Article, Book Chapter
    Recenzirano
    Odprti dostop

    The contact glass-break detector is very often marked as very unreliable and these models are not very popular in a security application. The aim of this article is to find out the bottleneck of the ...
Celotno besedilo

PDF
1 2 3
zadetkov: 27

Nalaganje filtrov