Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3901
Research on distributed identity authentication mechanism of IoT device based on blockchain
Published 2020-06-01“…Aiming to solve problems of the low compatibility and weak anti-attack ability of the Internet of things (IoT) centralized platform in the device identity authentication process,a blockchain-based distributed IoT device identity authentication architecture was proposed.The digital identity and related information were stored in the new block data structure,and a distributed IoT device identity authentication mechanism was proposed based on the cryptography related knowledge.At the same time,a device digital certificate issuance process and a detailed process of the identity authentication were designed.The security analysis of the proposed mechanism were carried out from the aspects of power constraints,device privacy protection,and ability to resist attacks among various entities.The performance of three aspects,which were security attributes,computational overhead and storage overhead,were compared and analyzed.The results show that the proposed identity authentication mechanism can resist a variety of malicious attacks,achieve highly secure distributed IoT identity authentication,and has certain advantages in the performance.…”
Get full text
Article -
3902
Research on RTF array overflow vulnerability detection
Published 2017-05-01“…When the virtual function was executed,it could cause array overflow vulnerability due to error operation of the virtual function table of C++ object.By attacking the virtual function,it could cause the system crash,or even the attacker to control the execution of program directly was allowed,which threatened user’s security seriously.In order to find and fix this potential security vulnerability as soon as possible,the technology for detecting such security vulnerability was studied.Based on the analysis of the virtual function call during the MS Word parsing RTF files,the array overflow vulnerability generated by MS Word parsing abnormal RTF files,and a new RTF array overflow vulnerability detection method based on the file structure analytical Fuzzing was proposed.Besides,an RTF array overflow vulnerability detection tool (RAVD,RTF array vulnerability detector) was designed.The test results show RAVD can detect RTF array overflow vulnerabilities correctly.Moreover,the Fuzzing results show RAVD has higher efficiency in comparison with traditional file Fuzzing tools.…”
Get full text
Article -
3903
A Two-Stage Greedy Genetic Algorithm for Simultaneous Delivery and Monitoring Tasks with Time Windows
Published 2025-01-01Get full text
Article -
3904
Research and realization of the Trojan detection engine based on Android
Published 2016-10-01“…During recent years, Trojan viruses on Android systems have greatly evolved, and the frequent security breach of Android systems is rapidly becoming a great concern of contemporary cyber security. …”
Get full text
Article -
3905
A Mutual Broadcast Authentication Protocol for Wireless Sensor Networks Based on Fourier Series
Published 2015-12-01“…The most important thing of MBAP is the mutual broadcast authentication method which ensures the security of the network greatly.…”
Get full text
Article -
3906
A survey of cybersecurity for intelligent connected-automated vehicle
Published 2020-04-01“…(Semi-) Autonomous vehicles use a new generation of information and communication technologies to realize a full range of interactions between vehicles and cloud,vehicles and vehicles,vehicles and roads,and vehicles and pedestrian,etc.When cars started to become connected computers on wheels,network security became a major challenge,and because the scope of cyber threats extended from virtual space to physical space,the harm of cybersecurity had risen to human life.The electronic/electrical structure,in-vehicle network structure,and out-of-vehicle network structure of intelligent vehicles were introduced,the security requirements of vehicle networks were elaborated,several cyber-attacks against connected-automated vehicle (CAV) were pointed out,the available defense measures against these attacks were addressed.The advantages and disadvantages of these measures were summarized.Finally,possible defense measures and directions in the future were discussed to further ensure the security of CAV.…”
Get full text
Article -
3907
Research on multidimensional dynamic defense strategy for microservice based on deep reinforcement learning
Published 2023-04-01“…Aiming at the problem that it is hard for security defense strategies in cloud native to guarantee the quality of service under dynamic requests, a multidimensional dynamic defense strategy for microservice based on deep reinforcement learning, named D2RA strategy, was proposed to provide dynamic configuration schemes that ensure security defense performance and quality of service for microservices under dynamical requests.Firstly, based on the characteristics of multiple replicas and invocation chains of microservices, a microservices state graph was established to depict the maps between requests, system configuration and security performance, quality of service, and resource overhead of microservices.Secondly, the D2RA framework was designed and a dynamic strategy optimization algorithm based on deep Q-network was proposed for microservices to provide fast and optimal system configurations update scheme under dynamic requests.The simulation results show that D2RA effectively allocate resources under dynamic requests, and achieve 19.07% more defense effectiveness and 42.31% higher quality of service as compared to the existing methods.…”
Get full text
Article -
3908
Unobtrusive Behavioral and Activity-Related Multimodal Biometrics: The ACTIBIO Authentication Concept
Published 2011-01-01“…Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system, which uses a biodynamic physiological profile, unique for each individual, and advancements of the state of the art in unobtrusive behavioral and other biometrics, such as face, gait recognition, and seat-based anthropometrics. …”
Get full text
Article -
3909
Government Authority and Responsibility in the Universal Health Coverage Program from the Aspect of Participation and Financing
Published 2024-12-01“…Citizens' rights to Social Security are realized by the Government through the National Health Insurance Program (JKN Program) with the principles of Social Insurance. …”
Get full text
Article -
3910
Random-Parameters Behavioral Models to Investigate Determinants of Perceived Safety in Railway Stations
Published 2021-01-01“…The estimation results for a medium-sized railway station (Frosinone, Italy) confirmed that safety and security measures are not equally perceived by individuals and the use of random-parameters models leads to more robust estimates. …”
Get full text
Article -
3911
A Chaotic Cryptosystem for Images Based on Henon and Arnold Cat Map
Published 2014-01-01“…In this paper, a novel encryption scheme is presented for securing images based on Arnold cat and Henon chaotic maps. …”
Get full text
Article -
3912
A improved group quantum key distribution protocol with multi-party collaboration
Published 2025-01-01“…Nevertheless, a crucial yet frequently underexplored challenge involves the comprehensive evaluation of security quantum state modulation. To address this issue, we propose a novel framework for quantum group key distribution. …”
Get full text
Article -
3913
Empowering Diabetes Management Through Blockchain and Edge Computing: A Systematic Review of Healthcare Innovations and Challenges
Published 2025-01-01“…In the evolving landscape of health information management, the application of blockchain and edge computing technologies to chronic disease management remains underexplored, despite the urgent need for scalable, secure, and real-time solutions. This systematic review examines the integration of these technologies in healthcare, with a specific focus on diabetes management. …”
Get full text
Article -
3914
Blockchain-Based Anonymous Reputation System for Performance Appraisal
Published 2025-01-01“…ARSPA provides a secure and efficient approach to improve the reliability and fairness of performance appraisal.…”
Get full text
Article -
3915
Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks
Published 2021-01-01“…In the open wireless communication environment, security and privacy protection are important contents of VANET research. …”
Get full text
Article -
3916
Part 3. Clinical Practice Guideline for Airway Management and Emergency Thoracotomy for Trauma Patients from the Korean Society of Traumatology
Published 2020-09-01“…RSI should be performed in trauma patients to secure the airway unless it is determined that securing the airway will be problematic (1B). …”
Get full text
Article -
3917
Mediating role of fatigue driving in the influence of job demand and insecurity on safety incidents among bus drivers
Published 2025-01-01“…Findings Both job demands and job security showed significant positive associations with safety incidents among the drivers. …”
Get full text
Article -
3918
Energy-Efficient and Trust-Based Autonomous Underwater Vehicle Scheme for 6G-Enabled Internet of Underwater Things
Published 2025-01-01“…The proposed scheme addresses key challenges in UASNs, such as energy consumption, network stability, and data security. It integrates a trust management framework that enhances communication security through node identification and verification mechanisms utilizing normal and phantom nodes. …”
Get full text
Article -
3919
Advancing eHealth in Society 5.0: A Fuzzy Logic and Blockchain-Enhanced Framework for Integrating IoMT, Edge, and Cloud With AI
Published 2024-01-01“…To ensure data integrity and security, we integrate the Proof of Authentication 2.0 (PoAh 2.0) consensus mechanism within a blockchain-enhanced IoMT-Edge-Cloud framework. …”
Get full text
Article -
3920
Word Vector Representation of Latin Cuengh Based on Root Feature Enhancement
Published 2024-12-01Get full text
Article