Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3561
Trusted virtual machine management model for cloud computing
Published 2014-11-01“…For virtual machine in cloud computing,the authorization of manager domain is too centralized to be secure,and the strategies of tenants can be easily falsified.In view of the two problems,a trusted virtual machine management Model for cloud computing infrastructure is proposed.The model provides fine grained manager domain of virtual machine in which both managers and tenants are strictly constrained when they operate on other tenant domains.The sensitive code and data in tenant virtual machine cannot be accessed or falsified without permission.The model creates a trustable tunnel between tenant and system domain,and distributes tenant strategies using the tunnel in a secure way.Security analysis and experimental results show the model ensures the security of tenant data and tenant strategies effectively.…”
Get full text
Article -
3562
Data encryption technology based on cloud and terminal collaboration
Published 2018-02-01“…With the fast increasing computing and storage capability,the intelligent terminal has gradually became the most important personal information assistant,and the data security of the terminal has turned to be essential for customers.Data encryption is a basic component of security assurance,but currently the mainstream technology scheme has a series of drawbacks,such as high technical cost.Therefore,a data encryption scheme based on cloud and terminal collaboration was proposed to promote the security of keys and data files.…”
Get full text
Article -
3563
An End-to-End Rumor Detection Model Based on Feature Aggregation
Published 2021-01-01Get full text
Article -
3564
Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing Mechanism
Published 2014-01-01“…This control mechanism for benign worm propagation is of guiding significance to control the network security.…”
Get full text
Article -
3565
The Application of Approximate Entropy Theory in Defects Detecting of IGBT Module
Published 2012-01-01Get full text
Article -
3566
Culture of teenager’s spiritual safety: definition and characterization of criteria features
Published 2021-07-01“…To achieve this goal, we have identified the following tasks: 1) to consider the phenomenon of culture in the view of domestic pedagogy; 2) analyze the concepts related to the subject of research: spirituality, security, personal security, spiritual security; 3) on the basis of studying the characteristics of a spiritual personality, identify the criteria for the culture of teenagers spiritual security and outline the main characteristics of these criteria. …”
Get full text
Article -
3567
Trust evaluation optimization mechanism for cloud user behavior based on FANP
Published 2022-04-01“…The open cloud computing environment is facing security challenges and the traditional user behavior evaluation mechanism cannot guarantee the security of the cloud.In order to scientifically and quantitatively evaluate the user’s behavior trust, ensure the scientific and reasonable weight assignment, improve the security and credibility of user behavior under the cloud platform, a trust evaluation optimization mechanism combined with fuzzy analytic network process (FANP) was designed.In the proposal, user behavior trust evaluation based on one control target was extended to include two control target modules which were historical access behavior and current access environment.At the same time, the historical access behavior module was divided into two aspects: conventional behavior and gray behavior, and the current access environment module was divided into two directions: information integrity and access security.The corresponding control criteria was divided to construct the analytic network process (ANP) model under different control objectives.The limit hypermatrix under each target module was calculated to obtain the final stability weight of each element with the help of network analytic hierarchy process software.And the real user behavior data under the development platform was selected to comprehensively calculate the trust degree under different modules as the final behavior evaluation result.The expansion of the user behavior evaluation module refined the evaluation granularity, which makes the evaluation results more objective and accurate.In the cloud environment with the same malicious ratio, the optimization mechanism has better recognition effect, and it can identify cloud users with low trust efficiently and effectively, so as to improve the security and legitimacy of the cloud.At the same time, it also provids new research direction for solving the problem of user security and credibility, and effective risk control in the cloud environment.…”
Get full text
Article -
3568
Public Housing Allocation Model in the Guangdong-Hong Kong-Macao Greater Bay Area under Clustering Algorithm
Published 2021-01-01“…The allocation method of public housing based on demand clustering analysis focuses on improving the housing security level and strives to meet the higher-level housing improvement needs of housing security objects, so as to provide security objects with more expected living conditions and improve housing allocation effect.…”
Get full text
Article -
3569
PREVENTING VIOLENCE CRIMES (KIDNAPPING, ARMED ROBBERY, BRIGANDAGE OR COMMUNITY MASSACRE) WITH DRONES: AN EFFECTIVE ALTERNATIVE TO VEHICULAR PATROLS IN NIGERIA
Published 2024-07-01“… Security is a vital component of any Nation’s growth and development, with its absence, there is no progress. …”
Get full text
Article -
3570
-
3571
Intrusion Detection Systems in Wireless Sensor Networks: A Review
Published 2013-05-01“…Their distributed nature, multihop data forwarding, and open wireless medium are the factors that make WSNs highly vulnerable to security attacks at various levels. Intrusion Detection Systems (IDSs) can play an important role in detecting and preventing security attacks. …”
Get full text
Article -
3572
Research based on the method of Android system active defense without Root permission
Published 2016-01-01“…In order to solve the problem that the system security is reduced through getting Root permission and that the security of Android smartphone is not effective without Root permission, the working principle of ART, the Java reflection mechanism and AOP principle were studied. …”
Get full text
Article -
3573
Toward discovering and exploiting private server-side Web API
Published 2016-12-01“…Most of the interfaces for mobile application and server interaction use the Web API for communication,but the Web API introduced by these mobile applications may introduce new security issues.To facilitate the study of the security of Web API,a system for automatically discovering the server-side Web API interface in APK files based on the conventional Android program testing framework was designed and implemented.This system can help to develop the research on private server-side Web API interface security.…”
Get full text
Article -
3574
Video compression and encryption coding scheme based on zero tree
Published 2007-01-01“…According to the security of the scalable video stream,an integrated video compression-encryption scheme was proposed.The scheme chooses wavelet transform as the compression platform,encrypts the zero-tree symbol during the zero-tree generation process to guarantee the security of the video.Furthermore,a multiple levels encryption was proposed to satisfy different consumers’ requirement.It is proved that the scheme kept the scalability of the encoding,has high security,and small impact on compression efficiency,so it is suitable for real-time video transferring on the network.…”
Get full text
Article -
3575
Image Encryption Using a Lightweight Stream Encryption Algorithm
Published 2012-01-01“…Security of the multimedia data including image and video is one of the basic requirements for the telecommunications and computer networks. …”
Get full text
Article -
3576
Anonymous survey system based on NIZK
Published 2016-12-01“…Aiming at the security problem that the existing in electronic surveys,such as information fraud,privacy security etc.An anonymous electronic survey scheme based on non-interactive zero knowledge proofs (NIZK) was constructed,which had the characteristics of self-organization,non-interactive,anti-replay,and high efficiency.The system uses the NIZK protocol and the Boneh-Boyen signature scheme to verify the user's identity in non-interactive manner,which guarantees the authenticity of the scheme.The system also uses the Pedersen commitment scheme and the pseudo random function to hide the user's identity and the related information,which guarantees the ano-nymity.Security analysis show that the system has security features such as malicious users attack resistance and anonymity.Finally,the function of the system was also verified and the result show that the system can accomplish all the functions correctly and guarantee the anonymity and authenticity of the system effectively.…”
Get full text
Article -
3577
Modeling and Analysis of the Spread of Malware with the Influence of User Awareness
Published 2021-01-01“…By incorporating the security awareness of computer users into the susceptible-infected-susceptible (SIS) model, this study proposes a new malware propagation model, named the SID model, where D compartment denotes the group of nodes with user awareness. …”
Get full text
Article -
3578
Design and application of system with dual-control of water and electricity based on wireless sensor network and video recognition technology
Published 2018-09-01“…In order to solve the security problem of the user in wireless sensor network, this article proposes a radio frequency identification mutual security authentication protocol based on shared secret hash function. …”
Get full text
Article -
3579
Intelligent two-phase dual authentication framework for Internet of Medical Things
Published 2025-01-01“…The security resilience was also evaluated against man-in-the-middle, replay, and brute force attacks. …”
Get full text
Article -
3580
Perioperative Management of Patient with Systemic Mastocytosis Going for Total Thyroidectomy
Published 2025-01-01Get full text
Article