Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5361
Defense strategies selection based on attack-defense evolutionary game model
Published 2017-01-01“…Due to that the current network security researches based on game theory mostly use the completely rationality assumption,which is not consistent with the facts.Under the bounded rationality constraint of network attack-defense,attack-defense evolutionary game model and a method to solve evolutionary stable equilibrium based on the non-cooperative evolutionary game theory was proposed.The optimal defense strategy selection algorithm was designed based on the analysis of the evolutionary stable strategy.The effectiveness of the model and method proposed is verified by simulation results,through which some evolution conclusions of offensive behavior on the premise of limited rationality were drawn.…”
Get full text
Article -
5362
Password authentication scheme for mobile computing environment
Published 2007-01-01“…By means of IC(integrated circuit) card,RSA cryptography,and discrete logarithm,a password authentication scheme for mobile computing environment was presented.No verification tables were preserved at the server side to consolidate the security.To be applicable for the mobile computing environment,the scheme was designed as a one-roundtrip protocol to meet the computation-constraint terminals and narrow-bandwidth radio interface.Moreover,the passwords in use could be changed by users without any interaction with servers over the radio.The performance of the scheme was measured by making use of M/G/1/N queuing model and compared with that of TLS.…”
Get full text
Article -
5363
Current situation and development trend of data network
Published 2019-08-01“…The technological innovation of network is the basis and enabling condition of new application and business innovation.The industrial internet,5G and the ICT infrastructure had put forward new requirements and challenges to the data network,including deterministic transmission,differentiated access services,ubiquitous mobile support,the credible internal security,and autonomous operation and maintenance.The existing problems of data network were analyzed,the research ideas of data network generation were pointed out,some key technologies of network 5.0 were put forward,and the problems involved in the construction of network innovation platform was dicussed.…”
Get full text
Article -
5364
Interaction based on method for spam detection in online social networks
Published 2015-07-01“…In online social networks,advertisements,rumors and malicious links are propagated by spammers arbitrarily.They not only disturb users’usualaccess,but also bring about network security threats and social panics.In an attempt to deal with the spam problems,an information diffusion model was proposed to capture the features of spam propagation.Propagation behaviors are quantitatively analyzed to detect spam messages with a decision tree-based method.The effectiveness of proposed detection model is evaluated with real data from the micro-bloggingnetwork of Sina.The experimental results show that proposed model can effectively detect spams in Sina micro-bloggingnetwork.…”
Get full text
Article -
5365
Consumer Debt and Over-Indebtedness in Times of COVID-19
Published 2022-03-01“…Eighty participants from academia, consumer protection, social associations, business and ministries discussed three topics on 16 December, 2021 at the invitation of the German Council of Consumer Experts: 1) concepts, developments, causes of consumer indebtedness and over-indebtedness; 2) their social context; and 3) measures to secure economic self-determination.…”
Get full text
Article -
5366
Keeping a Household Inventory and Protecting Valuable Records
Published 2019-12-01“…You will, if you do both of the following: • Keep an up-to-date household inventory • Keep the inventory and other valuable documents in a secure location This 4-page publication provides details about these two tasks. …”
Get full text
Article -
5367
PERSPECTIVES OF USING OF HIGH-SPEED STEELS FOR PRODUCTION OF CAST METAL-CUTTING INSTRUMENT. THE WAYS OF THE STRUCTURE AND CHARACTERISTICS IMPROVEMENT
Published 2004-05-01“…On the basis of industrial tests it is shown that at correct nomenclature choice for embedding there are being created the backgrounds for secure work of cast instrument, resistance of which can be even higher as compared to the traditional instrument due to higher endurance of cast-steel…”
Get full text
Article -
5368
Research on attribute-based encryption with keyword search for cloud storage
Published 2017-11-01“…To safeguard the sensitive data stored on the cloud and promote the efficiency of data sharing simulta-neously,a secure flexible and efficient attribute-based encryption scheme with keyword search is proposed,which designs an index generation mechanism that requires the private key of data owner to resist the keyword guessing attack,supports one-to-many application scenarios based on the linear secret shared access structure,introduces the conjunctive subset keyword search technique and online/offline technique to improve search flexibility and efficien-cy.Theoretical analysis and experimental evaluation show that the proposed scheme enjoys high efficiency.…”
Get full text
Article -
5369
Fine-Grained Network Traffic Identification Based on Tilera Platform
Published 2013-11-01“…It is essential for network managers to decide how to use a reasonable allocation of bandwidth, providing differentiated services, as well as conducting security monitor and management so as to do fine-grained and precise IT operation. …”
Get full text
Article -
5370
De l’image avant toute chose : mémoires et mythes pour les Espagnes en exil de 1939
Published 2021-02-01“…The study of some graphic, essayistic, filmic, photographic, odonymic and/or museographic traces around plural 1939 Civil War Spain and its 1939 exiled shifts in France, as historical and memory amalgams fed by the transmission of diverse testimonies and imaginaries, represent other sources in order to redefine myths, between supra-European aspirations of peaceful identity agreed at the end of the 20th century, and national fears about globalization, regionalization, multiculturalism, Islamism and / or migratory pressures in the 21st century, particularly, when scrutinized through concentration practices, derived from the incapability of reconciling freedom and security.…”
Get full text
Article -
5371
Effect of Employees’ Values on Employee Satisfaction in Japanese Retail and Service Industries
Published 2019-01-01“…For most companies, recruitment is difficult, and employees change jobs often, making securing staff an important business issue. Nonregular and regular employees are treated differently; the problem is thus partly social in nature. …”
Get full text
Article -
5372
A Latent Implementation Error Detection Method for Software Validation
Published 2013-01-01“…The method complements the incompleteness of security properties for software model checking. More accurate models are characterized to leverage the effectiveness of the model-based software verification and testing combined method.…”
Get full text
Article -
5373
ANALYSIS OF THE RESULTS OF THE RUSSIAN STRATEGIC IMPLEMENTATION PROGRAM OF INNOVATIVE DEVELOPMENT
Published 2018-01-01“…The experience of advanced nations shows that innovation is the key to economic security and to reducing the dependence of national economies on the international market. …”
Get full text
Article -
5374
Un Triángulo vital para la República: Gran Bretaña, Francia y la Unión Soviética ante la Guerra Civil española
Published 2001-06-01“…Its fundamental conclusion is that the prickly « Spanish problem » revealed throughout the profound cleavage between the « policy of collective security » as it was understood by the USSR and the « policy of appeasement » as it was practised by the French and British governments. …”
Get full text
Article -
5375
Victimization analysis model of user network behavior based on network traffic
Published 2021-02-01“…The analysis of network victimization is of great significance to the prevention and control of telecom fraud.By studying the network traffic generated by the interaction between users and websites, a victimization identification model of telecom fraud crime based on network behavior flow analysis was proposed, the association rules between different behavior characteristics were analyzed, the behavior sequence features were reconstructed, and the victimization of network behavior sequence with random forest algorithm was evaluated.Based on the network behavior data set of public security organs, the experiment proves that the model can effectively improve the recognition accuracy of network behavior victimization.…”
Get full text
Article -
5376
Situation description and critical technology analysis for industrial connection of intelligent manufacturing
Published 2017-11-01“…With the formally issue of the industrial internet in USA,the industry 4.0 in German and made in China 2025,the integration of the IT,Internet and industrialization has became the trend of intelligent manufacturing.Industrial connection is the basic ability for intelligent manufacturing.Firstly,the technology situation of OT and IT industrial connection was described.And then combined with made in China 2025,the eight demands for industrial internet scenarios and industrial connectivity key technology were analyzed,including data acquisition,IP network,wireless network,identifier resolution and network security,Finally,according to the domestic situation,the future trend of industrial connection was prospected.…”
Get full text
Article -
5377
Un mois à l’IHEDN : la vision d’une géographe
Published 2024-06-01“…I describe all the lectures and debates, as well as the visits to military sites, to companies cooperating with the Army and civil security or political centres. The aim is to take stock of the lasting contributions of this immersion to the daily practice of French geography and to understand the intellectual contributions of this session, which complement my university education.…”
Get full text
Article -
5378
Sustainability and Equity Challenges to Pension Systems: The Case of Lebanon
Published 2018-08-01“…In addition to sustainability issues, the pension system also suffers from equity shortcomings – Lebanon is the only MENA country that does not offer social security for retirees in the private sector. While several reform proposals have been formulated since the early 2000s, none has been implemented to date. …”
Get full text
Article -
5379
Blockchain technology for Internet of things: an overview
Published 2021-03-01“…Internet of things (IoT) is changing the data-driven smart industry due the massive availability of IoT data.Nevertheless, the IoT also poses some challenging issues like decentralization, poor interoperability, privacy and security vulnerabilities.The recent advent of blockchain can potentially tackle the above issues.The marriage of blockchain and IoT was investigated, and named this integration as blockchain of things (BCoT).In particular, the IoT and blockchain technology was introduced firstly.The convergence of blockchain and IoT was introduced, and the proposal of BCoT architecture was presented.The application of the Internet of things in the industry was further discussed.Finally, the open research directions in the field were outlined.…”
Get full text
Article -
5380
Keeping a Household Inventory and Protecting Valuable Records
Published 2019-12-01“…You will, if you do both of the following: • Keep an up-to-date household inventory • Keep the inventory and other valuable documents in a secure location This 4-page publication provides details about these two tasks. …”
Get full text
Article