Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5561
The problem of selecting digital development priorities for the region and ways of its solution
Published 2021-12-01“…The necessity of integration of federal and municipal information systems and development of advanced production technologies related to information and communication technologies necessary to ensure the competitiveness and economic security of enterprises in the Nizhny Novgorod region has been substantiated.…”
Get full text
Article -
5562
Research on SSDF Attack and Defense for Cooperative Spectrum Sensing
Published 2014-01-01“…To further understand the SSDF attack and its current research situation and development trend, the types of SSDF attack were analyzed in the form of three aspects, and several typical security methods were concluded. Meanwhile, the current problems of SSDF attack and research trends in this area were discussed.…”
Get full text
Article -
5563
Évaluer l’impact d’un changement d’échelle sur la durabilité des services d’eau : la méthode ABAFAD
Get full text
Article -
5564
Cabool (1842) d’Alexander Burnes : du récit de voyage au plaidoyer politique ?
Published 2015-02-01“…It deals with the need to make the Indian subcontinent’s north-west frontier area secure, to maintain a delicate balance between the frontier’s neighbouring states, to counter the threat represented by Persia and Russia while at the same time considering these issues within the broader context of British-Russian relations. …”
Get full text
Article -
5565
Multifonctionnalité de l’agriculture urbaine à Montréal : étude des discours au sein du programme des jardins communautaires
Published 2010-09-01“…Research show that urban agriculture could be a solution to meet modern urban issues, as food security, population health, environmental urban services, social network and popular education. …”
Get full text
Article -
5566
Towards Accurate Node-Based Detection of P2P Botnets
Published 2014-01-01“…Botnets are a serious security threat to the current Internet infrastructure. …”
Get full text
Article -
5567
A Survey of Content-Oriented Future Communication Network
Published 2012-09-01“…The study background of CON following with several key technologies including naming, routing, security and cache are introduced. At last we make a prediction on the research focus of future CON and the development direction.…”
Get full text
Article -
5568
HRR: a data cleaning approach preserving local differential privacy
Published 2018-12-01“…While simplifying the data pre-processing process, we want to find a balance between data availability and security.…”
Get full text
Article -
5569
Analysis of the Time Series Generated by a New High-Dimensional Discrete Chaotic System
Published 2018-01-01“…In this study, a digital sequence generator based on a high-dimensional chaotic system is proposed to ensure performance and security. The proposed generator has low resource consumption, and the digital pseudo-random output sequence has a large period. …”
Get full text
Article -
5570
A case report of complete cricotracheal separation: an experience from the east coast of Malaysia
Published 2022-12-01“…The most crucial part of managing this injury is to establish a secure airway. Tracheostomy under local anesthesia is the preferred method of airway stabilization, in order to avoid further injuries to the airway caused by endotracheal intubation. …”
Get full text
Article -
5571
Information exchange model of multi control nodes in trustworthy and controllable network
Published 2010-01-01“…A new model based on two-layer Chord was proposed to realize information exchange between multi control nodes in trustworthy and controllable network.It constructs the two-layer Chord by constructing Chord between control nodes in AS and between ASes respectively.It uses this two-layer Chord to generate a two-layer aggregation tree automatically in exchanging process,which is used to realize basic information communication services.It provides AS administrative isolation for security and availability by guaranteeing path convergence for the same information in AS,and improves efficiency of communication.Meanwhile,it guarantees load balance between control nodes.Experiments verify that IEM has good performance.…”
Get full text
Article -
5572
Abnormal Event Detection via Multikernel Learning for Distributed Camera Networks
Published 2015-09-01“…Distributed camera networks play an important role in public security surveillance. Analyzing video sequences from cameras set at different angles will provide enhanced performance for detecting abnormal events. …”
Get full text
Article -
5573
Research on system log anomaly detection based on deep learning
Published 2019-10-01“…The system log reflects the running status of the system and records the activity information of specific events in the system.Therefore,the rapid and accurate detection of the system abnormal log is important to the security and stability of the system.A log anomaly detection algorithm based on GRU neural network is proposed.Log parsing is implemented based on log key technology.Log anomaly detection is realized by using anomaly detection model of execution path and anomaly detection model of parameter value.The system has the advantages of less parameters and faster training.It improves the running speed while achieving higher detection accuracy,and is suitable for log analysis of large information systems.…”
Get full text
Article -
5574
Modeling of the mimic defense based on heterogeneous redundancy
Published 2020-05-01“…The unbalanced development status of network security was introduced.The main hazards and the mechanism model of penetration testing were described,and the inherent shortcomings of many existing traditional defense methods were analyzed.However,new method of the mimic defense model makes the attack information obtained invalid by dynamically selecting the executive set and adaptively changing the system composition.The same attack mode is difficult to be maintained or reproduced.Based on the attack chain model,the traditional defensetechnology and mimic defense technology were analyzed and compared,and it was demonstrated that it had a protective role in multiple stages of the attack chain.Finally,the effectiveness and superiority of the mimic defense was verified by experiments,and the model was summarized and prospected.…”
Get full text
Article -
5575
Proof of work algorithm based on credit model
Published 2018-08-01“…A consensus protocol based on the credit model was proposed.Firstly,the consensus agreement drew on the idea of personal credit risk assessment and a node credit model based on BP neural network was designed.Secondly,a piecewise rotation model was also constructed to segment the search space according to the node’s credit level to generate new blocks.At the same time,the possible attack of the protocol was analyzed and the vulnerability of this protocol was fixed.Finally,the simulation experiments show that the protocol not only effectively reduces the huge resource consumption in the process of new block generation,but also suppresses the generation of the large mine pool,making the whole blockchain system more secure and reliable.…”
Get full text
Article -
5576
Assessment of occupational injury and illness risks for the position of mineral water warehouse forklift operator
Published 2024-11-01“…The purpose of assessing the level of risk is to offer the possibility of knowing the real situation at each workplace, from the point of view of work security, in order to take the most suitable preventive measures for the given situation. …”
Get full text
Article -
5577
Paramounts of Intent-based Networking: Overview
Published 2024-12-01“…The current IBN model detains its adaptation as network assurance requirements of ensuring network security and scalability, and continuity are unfulfillable via conduct of network analysis and track of intent drift. …”
Get full text
Article -
5578
Reflections on data network technology
Published 2020-07-01“…The history of data network development and standardization was reviewed,and the idea ofsub-generational development concept for future network was put forward.It was pointed out that there were two technical routes in network design:the development technology route with users and business applications as the core,the gradual increase of network capabilities according to the needs of users and applications,and the development technology route with network as the core and the main body of capacity responsibility.Network 5.0 adopts “network as the core design concept”.A detailed description of three important capabilities of network 5.0 was given:endogenous credibility and security,endogenous network resource perception,deployment and control,and endogenous network certainty.…”
Get full text
Article -
5579
« Et voilà qu’arrive l’aventure ! »
Published 2019-12-01“…In this excerpt, Daniel Koehl recalls the mutiny at the Saint-Maur prison in 1987, of which he was one of the main leaders. The ultra-secure prison, built twelve years before, was completely destroyed during the mutiny.…”
Get full text
Article -
5580
User interests-based microblog tracing algorithm
Published 2020-12-01“…Microblog information tracing refers to finding the source set of microblog topics according to the analysis of crawled microblog texts and it’s of great significance in the aspect of public opinion control and information security.A user interests-based tracing method (ITM) was proposed.The proposed method calculates the influence of the blogger based on the interest of the microblog blogger,and also calculates the influence of the commentators based on the interest of the commentators.The ranking algorithm was used to score the blogs according to publication time,notability and influence,and the source of the blogs was traced according to the blog score rank.Experimental results show that the accuracy of the proposed algorithm improved about 21% compared with the traditional tracing algorithms.…”
Get full text
Article