Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
361
Research on security architecture of strong PUF by adversarial learning
Published 2021-06-01“…To overcome the vulnerability of strong physical unclonable function, the adversarial learning model of strong PUF was presented based on the adversarial learning theory, then the training process of gradient descent algorithm was analyzed under the framework of the model, the potential relationship between the delay vector weight and the prediction accuracy was clarified, and an adversarial sample generation strategy was designed based on the delay vector weight.Compared with traditional strategies, the prediction accuracy of logistic regression under new strategy was reduced by 5.4% ~ 9.5%, down to 51.4%.The physical structure with low overhead was designed corresponding to the new strategy, which then strengthened by symmetrical design and complex strategy to form a new PUF architecture called ALPUF.ALPUF not only decrease the prediction accuracy of machine learning to the level of random prediction, but also resist hybrid attack and brute force attack.Compared with other PUF security structures, ALPUF has advantages in overhead and security.…”
Get full text
Article -
362
Automatic Generation of Simulators for Processors Enhanced for Security in Virtualization
Published 2025-01-01Subjects: Get full text
Article -
363
-
364
Violation of human rights as the basis for the threats to international security
Published 2021-12-01Subjects: Get full text
Article -
365
Delay and energy minimization for MEC-based secure communication
Published 2020-11-01Subjects: Get full text
Article -
366
FOOD SECURITY IN SOUTH ASIA: MAJOR CHALLENGES AND SOLUTIONS
Published 2018-05-01Subjects: Get full text
Article -
367
Problems of economic security management of the enterprises of the aviation industry
Published 2018-12-01Subjects: Get full text
Article -
368
Defense and Security Mechanisms in the Internet of Things: A Review
Published 2025-01-01Subjects: Get full text
Article -
369
Secure and Privacy Enhanced Gait Authentication on Smart Phone
Published 2014-01-01“…In this paper, we propose a novel gait based authentication using biometric cryptosystem to enhance the system security and user privacy on the smart phone. Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. …”
Get full text
Article -
370
WORLD EXPERIENCE IN ADMINISTRATIVE AND LEGAL SUPPORT OF FOOD SECURITY
Published 2024-12-01Subjects: “…food security…”
Get full text
Article -
371
An Efficient Data Analysis Framework for Online Security Processing
Published 2021-01-01“…Industrial cloud security and internet of things security represent the most important research directions of cyberspace security. …”
Get full text
Article -
372
Lightweight security architecture design for wireless sensor network
Published 2012-02-01“…Most previous security proposal did not consider key management or their authentication efficiency was very low.Lightweight security architecture and lightweight security algorithm were proposed for wireless sensor network,The problem of network encounters malicious nodes maybe occur in the procedure of backbone networks networking could be solved by threshold secret sharing mechanism.The lightweight ECC was proposed to optimize the CPK architecture based on normal ECC,authentication was efficient without the third-party CA,and could reduce the computational complexity,the key management could meet the resource limit in wireless sensor network,and the key security depended on the exponential computation complexity of the elliptic discrete logarithm decomposition.The scheme used the improved two-way authentication to ensure the communication security between common node and sink node,which could prevent man-in-the-middle attack.…”
Get full text
Article -
373
Improving the level of food security of the region: cluster approach
Published 2021-10-01Subjects: “…economic security…”
Get full text
Article -
374
Formal modeling and analyzing method for database security policy
Published 2015-09-01Subjects: Get full text
Article -
375
Challenges of Gender Policy Implementation in the Security and Defense Sector
Published 2020-09-01“…The authors of the article have studied the problems of ensuring the principles of gender equality in the free trade sector of the security and defense sector. Aspects of gender equality have a special role in ensuring the educational process, managing the free economic zone and overcoming stereotyping of society, especially in the security and defense sector. …”
Get full text
Article -
376
Information Security Risk Management Model for Big Data
Published 2022-01-01“…The essence of information security management is risk management, which is closely related to each other. …”
Get full text
Article -
377
Automatic Verification Analysis Technology of Network Security Domain
Published 2015-01-01Subjects: “…security domain…”
Get full text
Article -
378
A Study on the Security Algorithm for Contexts in Smart Cities
Published 2014-06-01“…However, the provided services are to be secured and well protected. Each customised service usually keeps tailored security policy and algorithm. …”
Get full text
Article -
379
RETRACTED: Main directions of ensuring food security in the regions
Published 2024-01-01Get full text
Article -
380
Methodology of Creation and Structure of the Corporate Information Security Unit
Published 2022-11-01Subjects: Get full text
Article