Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5501
Game theory-based malware propagation model for wireless sensor network
Published 2018-11-01“…Malware propagation is an important security problem faced by wireless sensor network (WSN).From the perspective of game theory,the microscopic mechanism of malware propagationin WSN was analyzed.The attack-defense game model of WSN was built,and the mixed Nash equilibrium solution of the model was obtained.With the solution,the infection probability of malware was determined and the theoretical model for the malware propagation in WSN was established.Meanwhile,a cellular automata model was proposed to simulate malware propagation process in WSN.Simulation experiments reveal the relationship between the propagation speed and the game parameters.The results of this study are of significance for people to formulate measures to reduce the propagation speed of malware.…”
Get full text
Article -
5502
Service selection approach for enhancing trustworthiness of Web service
Published 2011-01-01“…Making use of the game theory,a model of service selection based on Nash bargaining solution was build,and an approach for enhancing Web service trustworthiness was proposed.A bargaining algorithm is designed between ser-vice sides of both complete rationality,through adjusting service price,to achieve maximum utility for both service re-questor and provider,and increase the success rate of transactions and service trustworthiness.Results of experiments show that,on the basis of the game that according to quality of service,reputation and security between service provider and requestor,the service selection can promote the establishment of trustable service computing environment and en-hance credibility of the service.…”
Get full text
Article -
5503
One-time password authentication for one-way communication without re-registration
Published 2020-06-01“…One-time password is a password that is valid for only one session on a system or device.The existing one-time password scheme without re-registration which is not limited by the number of authentication only supports online authentication,but can not support offline authentication.To solve the above problems,a one-time password authentication scheme for one-way communication without re-registration was proposed.The scheme combined the time-based one-time password scheme with the way of no re-registration.It can realize the offline authentication while satisfying the infinite authentication times and the password time-effective.Finally,the security of the scheme is proved.…”
Get full text
Article -
5504
Dynamic Analysis of Network Protocol Hiding Behavior Based on Perceptual Mining
Published 2022-01-01“…This paper analyzes the typical abnormal behaviors such as hidden and invisible attacks of network protocols and proposes a new method to perceive and mine the abnormal behaviors of protocols so as to evaluate the operational security of protocols. Aiming at the problems of long latency and difficulty to expose the hidden behavior of network protocols, a scheme combining dynamic stain analysis and instruction clustering analysis is proposed. …”
Get full text
Article -
5505
Construire des minorités sexuelles et de genre dans les écoles étasuniennes
Published 2019-06-01“…If such safe spaces improve student’ security and sense of safety, they run the risk of depoliticizing and reinforcing groups boundaries by focusing on students’ emotional and intellectual comfort and concealing other types of domination.…”
Get full text
Article -
5506
Data outsourcing authentication model based on authenticated data structures for cloud computing
Published 2011-01-01“…The outsourcing authentication model based on authenticated data structures was proposed.The formal defini-tion,data query authentication protocol and data updating authentication protocol of the model was presented.The crucial problems when the authenticated data structures are being used were analyzed.With designing the new extended coher-ence proof generation algorithm and the new extended verifying algorithm,authenticated data structures in the model very well was used.Finally the model with others through the performance analysis including the security and efficiency,the results of which show that:the model is more efficient than others as well as the consistency and correctness require-ments are also guaranteed.…”
Get full text
Article -
5507
Initial and Continued Airworthiness: Commonalities and Differences Between Civil and Military Aviation
Published 2024-12-01“…A trend exists towards the homogenization of rules in both fields; however, due to national security interests, these are generally agreed upon on a case-by-case basis. …”
Get full text
Article -
5508
Comparative analysis of smart home management systems
Published 2024-06-01“…The detailed analysis includes a comparison of documentation, functionality, configurability, security, architecture and user feedback. In addition, two studies were conducted. …”
Get full text
Article -
5509
Reducing Human-Bear Conflicts: Bear-Resistant Trash Cans
Published 2017-06-01“…Pienaar, and and Mike Orlando and published by the Wildlife Ecology and Conservation Department explains how to secure human garbage from bears so that they don’t become reliant on human food sources, a condition that puts them at great risk of being killed from vehicle collisions, illegal shooting, or euthanasia.http://edis.ifas.ufl.edu/uw429 …”
Get full text
Article -
5510
Efficient ID-based multicast authentication protocol in wireless sensor networks
Published 2009-01-01“…In order to overcome the drawback of the existent multicast authentication protocol in WSN,the PKC-based services for WSN was explored and an efficient ID-based multicast authentication protocol was presented.The protocol with message recovery provided the feature that the message was recoverable from the signature and hence the computa-tional cost and communication overhead of the protocol had been reduced greatly.This protocol was proved secure against existential forgery under adaptive chosen message and ID attack in the random oracle model.The performance analysis results show that the proposed scheme can effectively reduce resource cost,adapt the characteristics of WSN and is clearly superior to the HESS,Zhang and BLS protocols.…”
Get full text
Article -
5511
Verifiable multi-secret sharing schemes applicable to arbitrary access structures
Published 2007-01-01“…Verifiable multi-secret sharing on general access structures was studied.A method of construct verifiable se-cret sharing schemes with arbitrary access structure was given.The verifiable multi-secret sharing schemes constructed by this method have the following properties: multiple secrets can be shared at the same time in a group of shareholders.The secret shares sent to shareholders are publicly verifiable.The public information with respect to each shared secret is publicly verifiable.And the supply of false shares in the process of secret recovery can be prevented.Analysis shows that the verifiable multi-secret sharing schemes constructed by our method are not only secure,but also efficient.…”
Get full text
Article -
5512
Cattell-Braasch Maneuver: A Gadget to Manipulate Abdominal Aortic Aneurysm in a Patient with a Left-Sided Inferior Vena Cava
Published 2019-01-01“…He underwent open surgery, and we employed the Cattell-Braasch maneuver to approach the abdominal aortic aneurysm from the right side. This enabled securing of the abdominal aortic aneurysm neck without mobilizing or dissecting the inferior vena cava. …”
Get full text
Article -
5513
Development research of terminal evaluation system of internet of things
Published 2021-02-01“…Under the large-scale commercial application of internet of things technology, the existing terminal evaluation system can not meet the new requirements of massive, multi-type and multi-form internet of things terminal evaluation.The research on the development of evaluation system for internet of things terminal was carried out, and the suggestions and methods of evaluation system for internet of things terminal were put forward from three dimensions of foundation, application and security, combined with the development trend of testing means, so as to provide reference for future development, promote the quality of IoT terminals, ensure the good interoperability between terminals and networks, and improve the end-to-end service quality.…”
Get full text
Article -
5514
Crônicas de ensino e pesquisa em trabalho de campo na fronteira entre Brasil e Guiana Francesa (França)
Published 2022-07-01“…The first was a series of lectures given by security authorities from both countries and a tour of reconnaissance of the landscape on the lower Oiapoque River using speedboats, and the second, a research mission in the middle and upper Oiapoque River, in the stretch between the city of Oiapoque and the community of Vila Brasil, to understand the effects of the Covid-19 pandemic on the movement of goods and people in the region.…”
Get full text
Article -
5515
Collection policy refining method for threat monitoring in complex network environment
Published 2019-04-01“…Personalized collect policy is one of the necessary conditions for effectively monitoring threats in the complex network environment.However,differences in security requirements and threat types make it difficult to effectively generate personalized collect policy.To address the above problem,a collection policy automatic refinement method was designed.Firstly,a hierarchical model of collection policy was proposed.Then,by transforming the policy refinement into a nonlinear optimization problem,a genetic algorithm was designed to balance between collection revenue and collection cost.Finally,simulation experiments verify that according to the requirements of high-level monitoring,the acquisition scheme can be automatically generated.…”
Get full text
Article -
5516
Cities and environmental emergencies. Green Infrastructures for the urban project
Published 2020-12-01“…The paper analyses the ability of Green Infrastructures to reduce vulnerability to climate impacts through the increase of biodiversity, positive effects of green open spaces on health and security against the threats posed by pathogens and the role of the digital network to support the maintenance of Green Infrastructures performance over time.…”
Get full text
Article -
5517
Research and implementation of the monitoring system of trusted counters
Published 2016-11-01“…In the digital works trading system,trusted counting mechanism effectively solves the disputes of copyright.To ensure credible counter proper,safe operation and control the counter status,version,a method and system based on trusted digital work counter transaction monitoring system,which combines with RSA,and other cryptographic techniques are proposed to achieve real-time monitoring and credible counter version upgrade of the operating state,to ensure the integrity of online transactions,confidentiality and cannot be tampered with.The architecture,function modules and data security structures of the system are described in detail.It has been widely used in the field of digital copyright protection.…”
Get full text
Article -
5518
Editorial Vol9 no2
Published 2010-10-01“…We have been fortunate in securing the publication of the main papers from this inspiring event, and these form the core of this issue of the Scottish Journal of Residential Child Care. …”
Article -
5519
Corrigendum to “A Compact Frequency Reconfigurable Hybrid DRA for LTE/Wimax Applications”
Published 2018-01-01Get full text
Article -
5520