Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5581
The European regulation on AI in the face of the biases and risks of algorithmic discrimination in migration contexts
Published 2024-12-01“…While global migration contexts face tight security control and an extensive digital transition, the European regulation on AI is still too limited in scope to counteract the negative impacts of the design and training of algorithms. …”
Get full text
Article -
5582
15-17 May 2024, 16th Global Communication Association Conference “The Future(s) of Communication: Promises and Predicaments”
Published 2024-12-01“…With participants from 15 countries, the event highlighted critical issues including data security, disinformation, media ethics, and the societal impacts of emerging communication technologies. …”
Get full text
Article -
5583
Das Andere der „erdumspannenden Gesellschaft“
Published 2023-12-01“…The future vision described in the 1924 novel Berge Meere und Giganten begins with the global spread of a social formation that strives to export its technology and security system to even the most remote regions. There is some opposition, however: the novel presents a multitude of actors who resist planetary homogenization and integration into networks (e.g., of global transport). …”
Get full text
Article -
5584
Mise en marché des petits pélagiques côtiers au Sénégal : formes de valorisation et enjeux autour de la ressource
Published 2021-12-01“…However, the emergence of new non-food uses and the trend of pelagic exports (growing global demand) threaten national food security and the sustainability of stocks. Unlike coastal demersal fish, where exclusive contracts are concluded between fishermen, fishmongers and fish processors, for coastal pelagics market mechanisms prevail, with landed fish being sold daily to the highest bidder. …”
Get full text
Article -
5585
New paradigm for Internet of things:intelligent spectrum-Internet of things
Published 2018-03-01“…The electromagnetic spectrum has become an indispensable national strategic resource in the information age.With the rapid development of the world’s integrated information network,aviation vehicles,and electromagnetic spectrum airspace operations,electromagnetic space faces three major challenges:the increasing shortage of spectrum resources,increasingly stringent spectrum security,and increasingly fierce spectrum confrontation.In order to deal with the three major challenges,the basic concepts and architecture of intelligent spectrum-Internet of things (IS-IoT) was proposed,and the key technologies and future application directions of the system was analyzed.The development of IS-IoT will provide a new paradigm for the Internet of things and a new solution to the conflict between the supply and demand of spectrum resources.…”
Get full text
Article -
5586
Cookie based online tracing method for cyberlockers resource
Published 2016-12-01“…In light of the non-negligible fraction accounted by the traffic flows originating from cyberlocks, it is necessary to trace them for net-work security. An efficient and scalable cookie based online cyberlockers resource tracing method was proposed, called CookieTracing. …”
Get full text
Article -
5587
Budget Policy of the New Federal Government
Published 2022-01-01“…The red lines of the new coalition partners — adherence to the debt brake, reform of basic security, no tax increases, green investments — were often seen as “squaring the circle”. …”
Get full text
Article -
5588
Ciphertext-only fault analysis of the SIMON lightweight cipher
Published 2019-11-01“…The ciphertext-only fault analysis on the SIMON cipher was proposed by injecting a random nibble fault under the random nibble fault model.After injecting faults,every faulty ciphertext could be decrypted and the statistical distribution of all intermediate states were analyzed by the attackers.On the basis of the previous distinguishers of SEI,GF,MLE,MLE-SEI,GF-SEI and GF-MLE,four novel distinguishers of GF-MAP,HW-MLE,GF-HW and HW-MAP were proposed to reduce faults.The results show that the SIMON cipher cannot resist against the ciphertext-only fault analysis.It provides an important reference for security analysis of other ciphers.…”
Get full text
Article -
5589
Analysis of the situation and problem on the legislation of cyberspace in China
Published 2015-12-01“…The internet governance and legislation have experienced the free development,the exploration and the comprehensive stages.There are some problems about the current legislation,such as the law level is low,the high-level law is lack,the legislation is relatively scattered,legislation is lagging far behind the technology,the cur-rent law is principle and lack of the operability,legislation is heavy duty,light-rights,and so on.According to these conditions,accelerating the basic legislation,such as the cyber security law,the personal information protection act,the internet service administration law,the act of e-commerce,the e-government law,the telecommunications act,and so on was suggested,so as to build a relatively complete cyber law system.…”
Get full text
Article -
5590
Mutual authentication scheme based on the TPM cloud computing platform
Published 2012-11-01“…A mutual authentication scheme based on the TPM cloud computing platform was proposed to solve the problem of mutual authentication between user and cloud computing server.Trusted computing technology and traditional smart card password method were used in cloud computing service platform.The scheme completed the authentication of both sides in cloud computing,generated the session key according consulting,at the same time,verified the credibility of cloud service platform.Experiment analysis shows that our scheme can resist various kinds of possible attacks,so it is therefore more secure than other schemes.And the computing time meet the requirements of cloud computing environment.…”
Get full text
Article -
5591
Study on RF module in UHF OFDM node for mobile multimedia sensor network
Published 2008-01-01“…It can be applied to very important person (VIP) motorcade video wireless monitoring system, public security emergency command system, and battlefield surveillance system, etc.…”
Get full text
Article -
5592
Clustering algorithm preserving differential privacy in the framework of Spark
Published 2016-11-01“…Aimed at the problem that traditional methods fail to deal with malicious attacks with arbitrary background knowledge during the process of massive data clustering analysis,an improved clustering algorithm, especially designed for preserving differential privacy,under the framework of Spark was proposed.Furthermore,it’s theoretically proved to meet the standard of ε-differential privacy in the framework of Spark platform.Finally,experimental results show that guaranteeing the availability of proposed clustering algorithm,the improved algorithm has an advantage over privacy protection and satisfaction in the aspect of time as well as efficiency.Most importantly,the proposed algorithm shows a good application prospect in the analysis of data clustering preserving privacy protection and data security.…”
Get full text
Article -
5593
Privacy-preserving access control for public wireless LAN utilizing the bitcoin blockchain
Published 2020-04-01“…In designing an access control scheme for public wireless LAN (WLAN),user privacy protection and user accountability are two conflict goals.A novel user management and access control scheme was proposed to solve this problem by utilizing the bitcoin blockchain and Intel SGX.It utilized unmodified bitcoin blockchain to manage the ownership of access credentials for users without relying on any trusted third party.It adopted Intel SGX-based mixing technology to enhance anonymity of users’ access credentials.It designed verification path rule to resolve the conflicts between the privacy-preserving and accountability objectives.The effectiveness and feasibility of the proposed scheme are also demonstrated by security analysis and performance evaluation.…”
Get full text
Article -
5594
Territórios africanos: colonização ímpia, descolonização cruel e globalização perversa
Published 2021-06-01“…The conflicts that lead the African population to the need to flee their countries of origin to live in refugee camps are the result of historical processes that have profoundly marked the development and security conditions in African states. In order to understand and analyze the conflicts that are present in Africa today, we seek through historical research to understand the main processes that placed Africa and its population in an environment of permanent crisis: colonization, decolonization and globalization. …”
Get full text
Article -
5595
Constructing a Private Cloud Computing Platform Based on OpenStack
Published 2012-09-01“…In the end, this paper analyzes the security and flexible computing resource allocation capabilities of the private cloud platform.…”
Get full text
Article -
5596
A Review of Semantic Sensor Technologies in Internet of Things Architectures
Published 2019-01-01“…Intelligent sensors should be seamlessly, securely, and trustworthy interconnected to enable automated high-level smart applications. …”
Get full text
Article -
5597
Malicious PDF document detection based on mixed feature
Published 2019-02-01“…Aiming at the problem of poor robustness and easy to evade detection in the detection of malicious PDF document,a malicious PDF document detection method based on mixed features was proposed.It adopted dynamic and static analysis technology to extract the regular information,structure information and API calling information from the document,and then a feature extraction method based on K-means clustering algorithm was designed to filter and select the key mixed features that characterize the document security.Ultimately,it improved the robustness of features.On this basis,it used random forest algorithm to construct classifier and perform experiment to discuss the detection performance of the scheme and its ability to resist mimicry attacks.…”
Get full text
Article -
5598
Islanding Detection for Microgrid Based on Frequency Tracking Using Extended Kalman Filter Algorithm
Published 2014-01-01“…Islanding detection is essential for secure and reliable operation of microgrids. Considering the relationship between the power generation and the load in microgrids, frequency may vary with time when islanding occurs. …”
Get full text
Article -
5599
China’s Cooperation in Latin America: Implications for Development Assistance
Published 2013-09-01“…Over the past decade, Chinese cooperation in Latin America and the Caribbean has gained momentum, propelled not only by growing trade, but also by increasingly diverse political, security, technological, and cultural ties. While this cooperation has brought tangible benefits, it has also generated new dynamics of competition, including among the actors involved in development assistance. …”
Get full text
Article -
5600
Probability problems on random permutation
Published 2006-01-01“…1)were presented.When distance a and the permutation order n were prime to each other,the distribution of number of the points with distance a was also given.By these results,the cryptographic security of random permutation is analyzed,and a new explication is presented on the significance of choosing quick trickle permutation in cipher designs.…”
Get full text
Article