Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4061
A Dynamic Intrusion Detection System Based on Multivariate Hotelling’s T2 Statistics Approach for Network Environments
Published 2015-01-01“…The ever expanding communication requirements in today’s world demand extensive and efficient network systems with equally efficient and reliable security features integrated for safe, confident, and secured communication and data transfer. …”
Get full text
Article -
4062
Revealing Traces of Image Resampling and Resampling Antiforensics
Published 2017-01-01“…In this paper, we proposed an effective and secure detector, which can simultaneously detect resampling and its forged resampling which is attacked by antiforensic schemes. …”
Get full text
Article -
4063
Lightweight PUF-based anonymous authentication protocol in V2G
Published 2024-10-01“…The ROR model and Scyther formal validation tool proved the security of the proposed protocol, and the informal security analysis showed that the proposed protocol was resistant to a variety of security attacks, such as physical attacks, location forgery attacks and privileged insider attacks. …”
Get full text
Article -
4064
Explaining geopolitical components affecting the strategic linkages of countries Case Study: Iran and Iraq
Published 2018-03-01“…In the current disorderly world, securing benefits and achieving optimal security for countries alone is very difficult and unavoidable. …”
Get full text
Article -
4065
Design of a SMS Based Voting System.
Published 2023“…This system is slow, expensive, less secure, not reliable, cumbersome and not very transparent. …”
Get full text
Thesis -
4066
Fast access authentication scheme for mobile IPv6 hierarchical network
Published 2013-08-01“…A fast access authentication scheme for mobile IPv6 hierarchical network was proposed, which improves the performance of access authentication of mobile IPv6 hierarchical network from two aspects, efficiency and security. Firstly, the scheme used the vector network address coding method to improve the home registration performance. …”
Get full text
Article -
4067
THE APPLICATION OF HILBERT-HUANG TRANSFORM MARGINAL SPECTRUM-MAHALANOBIS DISTANCE ON THE ANALYSIS OF TRACK IRREGULARITY
Published 2017-01-01“…Extracting the information of frequency-amplitude of the track irregularity through the Hilbert-Huang Transform( HHT) spectrum,the clustering analysis is carried on the track irregularity HHT spectrum for the railways of same operating condition,then we can get the track irregularity marginal spectrum standard( character) matrixes that are proper for describing different operation speed and the dynamic indexes,which will affect the security and comfort operation of the railway,based on these,the model of track irregularity HHT marginal spectrum-mahalanobis distance is built for the differentiate of running speed for the railway line and macroscopic predicting of the rail sections that would serious affect the railroad’s security and comfort operation.…”
Get full text
Article -
4068
Quantum identity authentication scheme based on measurement-device-independent quantum key distribution protocol
Published 2016-02-01“…Utilized to security properties of measurement-device-independent quantum key distribution (MDI-QKD)protocol, quantum identity authentication scheme based on MDI (QIA-MDI)protocol was presented. …”
Get full text
Article -
4069
Identity-based fully homomorphic encryption from learning with error problem
Published 2014-02-01“…The fully homomorphic encryption schemes based on learning with errors problem own a great potential value in the cloud computing security. However, the existing schemes share a common flaw of large sized public keys, which may cause inefficiency of such schemes in the key and identity management. …”
Get full text
Article -
4070
Can Latin America play a more influential role in a shifting world order?
Published 2025-01-01“…Latin America has played a secondary role in international challenges to a unipolar world order in today’s space for influence in managing the critical challenges transnational security and conflict. This article relations with a focus on Latin America’s role in the relations between Latin America and the great global systemic configuration. …”
Get full text
Article -
4071
On the Implementation of a Dynamic Direction Modulation System with Vector Modulators
Published 2019-01-01“…Dynamic directional modulation (DDM) has already proven to be an efficient technique to achieve physical layer security in wireless communications. System architectures based on vector modulators provide a flexible framework to implement synthesis methods that allow us to obtain increased security and/or independent multichannel transmissions. …”
Get full text
Article -
4072
Energy Price Crisis and War Sanctions — Tomorrow’s Energy Supply
Published 2022-04-01“…What challenges does German policy now face and what measures should it take in order not to jeopardise security of supply, price stability and the “Energiewende”? …”
Get full text
Article -
4073
Spectral-clustering-based abnormal permission assignments hunting framework
Published 2017-12-01“…Migrating traditional access control,such as mandatory and discretionary access control,into role-based access control(RBAC)lightens a practical way to improve the user-permission management efficiency.To guarantee the security of RBAC system,it is important to generate proper roles during the migration.However,abnormal user-permission configurations lead to wrong roles and cause tremendous security risks.To hunt the potential abnormal user-permission configurations,a novel spectral clustering based abnormal configuration hunting framework was proposed and recommendations were given to correct these configurations.Experimental results show its performance over existing solutions.…”
Get full text
Article -
4074
Board voting system based on the consortium blockchains
Published 2017-12-01“…The board voting is a scenario of anonymous voting on a particular group of individuals,which is strict with the identities of the participants.A board e-voting protocol based on the consortium blockchains was presented,which replaced the traditional trusted third party with the smart contract so as to reduce the system trust cost.It adopt a digital certificate-based identity mechanism to ensure that the voter's identity is legal.It adopt the blind signature based on elliptic curve technology to achieve the anonymity of voting.The security analysis shows that the proposed protocol can meet the requirements of unforgeability,anonymity and security etc,which is convenient and flexible to use.…”
Get full text
Article -
4075
Engaged by the Revolution: the Lepsis Chekist family in Vyatka (1919)
Published 2023-05-01“…The purpose of the work is to use the example of a single married couple of security officers to indicate the factors that influenced the life of the family in the era of social cataclysms. …”
Get full text
Article -
4076
Website defense strategy selection method based on attack-defense game and Monte Carlo simulation
Published 2018-08-01“…Aiming at the selection of security defense strategy in network attack-defense,the dynamic change process of mutual influence between attack-defense strategy was studied.Based on the game process of both offense and defense,the attack-defense game model was constructed,the attack process of the attacker based on Monte Carlo simulation was simulated and the attacker’s best attack utility was obtained,so as to calculate the best defensive utility of the defender.In order to maximize the effectiveness of network security defense,the optimal defense strategy under limited resources was implemented.Simulation experiments verify the effectiveness of the proposed method and analyze the influence of different parameter settings on the selection of defense strategy.…”
Get full text
Article -
4077
Research and Application of Mobile OA Technology in Power Generation Enterprise
Published 2013-11-01“…Combining the mature page adaptation techniques with VPN, authentication system and mobile device management system, a method to build mobile OA platform architecture was proposed and strictly controlled class 2 of information system level protection to building the security system, and the mobile OA system can deliver the best user experience under the premise of information security.…”
Get full text
Article -
4078
Anonymity handover authentication protocol based on group signature for wireless Mesh network
Published 2016-10-01“…In order to ensure that the Mesh network mobile client video,voice and other real-time strong applications without interruption,a secure and efficient handover authentication was very important.To protect the privacy of mobile nodes,an anonymity handover authentication protocol was proposed based on group signature for wireless mesh network.Compared with other handover authentication protocols based on group signature,the proposed scheme did not involve the group signature correlation operation,and the group signature algorithm was only carried out on the router.The pro-posed protocol not only enhances the security but also performs well in authentication efficiency and privacy-preserving.…”
Get full text
Article -
4079
Toward Intelligent Intrusion Prediction for Wireless Sensor Networks Using Three-Layer Brain-Like Learning
Published 2012-10-01“…Hence, the current intrusion detection schemes cannot provide enough security for WSNs, which poses a number of security challenges in WSNs. …”
Get full text
Article -
4080
Application of blockchain technology in digital music copyright management: a case study of VNT chain platform
Published 2025-01-01“…The system aims to enhance copyright proof and evidence storage, verify the originality of music copyrights, and facilitate secure copyright transactions.MethodsThe system leverages blockchain technology for data integrity and immutability, utilizes the Shazam algorithm to verify music originality, and employs smart contracts to secure transactions. …”
Get full text
Article