Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
501
Analysis of provably secure on-demand source routing in MANET
Published 2009-01-01Subjects: Get full text
Article -
502
Code security of mobile backup modules on the Android platform
Published 2017-01-01Subjects: Get full text
Article -
503
Research of Mobile Internet Core Security Requirement and Protection
Published 2013-11-01Subjects: Get full text
Article -
504
Efficient identification protocol provably secure in standard model
Published 2009-01-01“…The new identification protocol is proven secure against impersonation under concurrent reset attack setting in standard model. …”
Get full text
Article -
505
Research on Satellite Internet Security Simulation Test Technology
Published 2023-06-01Subjects: Get full text
Article -
506
SSDHT:social network-based secure DHT mechanism
Published 2018-11-01“…P2P systems have been widely used in the field of file sharing,etc.However,DHT (distributed hash table) networks have no center,no authentication,and lack of node authentication mechanism,making existing DHT-based P2P systems vulnerable to external attacks such as Sybil attacks.A DHT security enhancement mechanism based on social network was proposed,which introduced the trust relationship of nodes in the social network into the DHT network to improve the recognition ability of Sybil nodes.The KAD (Kademlia) algorithm was used as an example to verify the experiment.Experimental results based on Facebook and Twitter datasets show that the proposed security mechanism is suitable for large-scale dynamic networks and can effectively defend against Sybil attacks.…”
Get full text
Article -
507
Application of artificial intelligence technology in the field of security vulnerability
Published 2018-08-01“…The large number of software and the enhancement of complexity have brought severe challenges to the research of software security vulnerabilities.The efficiency of manual research on security vulnerabilities is low and cannot meet the needs of cyberspace security.Therefore,how to apply artificial intelligence techniques such as machine learning and natural language processing to the study of security vulnerabilities has become a new hot spot.Artificial intelligence technology can intelligently process vulnerability information,which can assist in the research of security vulnerabilities and improve the efficiency of research on security vulnerabilities such as vulnerability mining.Firstly,the key technologies of automatic mining,automatic assessment,automatic exploitation and automatic repair of security vulnerabilities were analyzed,which pointed out that the automation of security vulnerability mining was the key of the application of artificial intelligence in the field of security vulnerability.Then,the latest research results of applying artificial intelligence technology to the research on security vulnerabilities was analyzed and summarized in recent years,which pointed out some problems in the application and gave corresponding solutions.Finally,the development trend of intelligent research on security vulnerabilities was prospected.…”
Get full text
Article -
508
Economic security of the enterprise: The essence, structure and mechanism of ensuring
Published 2023-03-01Subjects: “…economic security; enterprise; financial security; intellectual and personnel security; information security; technical and technological security; factors; methods…”
Get full text
Article -
509
Cyber security laws and safety in e-commerce in India
Published 2023-06-01Subjects: Get full text
Article -
510
Reconstruction of BLP model based on secure subject access
Published 2007-01-01Subjects: Get full text
Article -
511
Suggestion on establishing curriculum system for information security major
Published 2016-07-01Subjects: “…information security…”
Get full text
Article -
512
Protocol security enhancement on secondary system of smart substation
Published 2015-12-01Subjects: Get full text
Article -
513
Architecture and mechanisms for secure and efficient internetworking of heterogeneous network
Published 2022-04-01Subjects: Get full text
Article -
514
Managing economic climate security: theoretical and applied aspects
Published 2022-01-01“…The article proposes to consider climate security as an important factor in the sustainable development of the economy. …”
Get full text
Article -
515
Benelux countries’ security strategies: between europeanism and atlanticism
Published 2024-08-01“…In the article, transformation of the foreign policy and security strategies of the Benelux countries – Belgium, the Netherlands and Luxembourg – is analyzed against the exacerbating conflict in Ukraine. …”
Get full text
Article -
516
Implementation architecture of mimic security defense based on SDN
Published 2017-10-01Subjects: “…mimic security defense…”
Get full text
Article -
517
Research of eMBMS's Security Mechanism and Content Protection
Published 2014-12-01Subjects: Get full text
Article -
518
Rational-security and fair two-party comparison protocol
Published 2023-12-01Subjects: “…secure comparison…”
Get full text
Article -
519
Innovative resource-saving security strategies for IoT devices
Published 2025-01-01“…Emphasis is placed on developing adaptive security mechanisms that can effectively respond to dynamic operational conditions and resource constraints. …”
Get full text
Article -
520
Analisis Burnout Programmer Terhadap Penerapan Secure Coding
Published 2024-08-01Subjects: Get full text
Article