Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
561
A quantifiable cloud computing platform security evaluation model
Published 2020-07-01Subjects: Get full text
Article -
562
Traffic planning of backbone link of quantum secure communication network
Published 2018-09-01Subjects: “…quantum secure communication network…”
Get full text
Article -
563
Discovery and research of network security vulnerabilities based on Web application
Published 2016-06-01“…Web security vulnerabilities can be divided into two categories,including security vulnerabilities Web platform and Web their own application.By analyzing the attack principle and process of Web application network security vulnerabilities,XSS vulnerability including type of the reflective,stored,and DOM,SQL injection vulner-ability and session authentication management vulnerability were studied.The corresponding preventive measures of the three kinds of vulnerabilities were put forward.…”
Get full text
Article -
564
A bibliometric analysis of food security and urbanization: insights and implications
Published 2025-01-01Subjects: “…food security…”
Get full text
Article -
565
‘Bottom-up securitization’: A visual turn in security studies
Published 2024-03-01Subjects: “…international security…”
Get full text
Article -
566
Provably secure secret sharing scheme based on bilinear maps
Published 2008-01-01Subjects: Get full text
Article -
567
Application of big data technology in enterprise information security management
Published 2025-01-01Subjects: “…Enterprise information security…”
Get full text
Article -
568
A Secure Object Detection Technique for Intelligent Transportation Systems
Published 2024-01-01“…Furthermore, this hybrid algorithm provides robust security against data poisoning-based model replacement and inference attacks throughout the training phase. …”
Get full text
Article -
569
Synchronization of hyperchaos of cellular neural network with applications to secure communication
Published 2000-01-01Subjects: Get full text
Article -
570
Security-enhanced live migration based on SGX for virtual machine
Published 2017-09-01“…The virtual machine may face the problem of information leakage in live migration.Therefore,a dynamic memory protection technique SGX was introduced and a security enhancement live migration method based on KVM environment was proposed.Firstly,on both sides of migration,a hardware-isolated secure execution environment centered SGX was built.It guaranteed the security of operations like encryption and integrity measurement and also ensured the security of private data.An encrypted channel to transfer migration data based on the remote attestation between the secure execution environments of both migration sides was constructed.And the mutual authentication of both sides’ platform integrity was realized.Finally,the security enhancement effect and did the experiment was analyzed.The results shows that the introduction of SGX won’t cause much negative effect to the migration performance.…”
Get full text
Article -
571
Method to generate attack graphs for assessing the overall security of networks
Published 2009-01-01Subjects: “…network security…”
Get full text
Article -
572
Land cover, land use, climate change and food security
Published 2023-12-01Subjects: Get full text
Article -
573
Power PTN security comprehensive evaluation based on power application
Published 2015-12-01Subjects: Get full text
Article -
574
Application of edge computing technology in smart grid data security
Published 2025-02-01“…Absrtact: In order to solve the problem that the two-way flow of power and information between user nodes and service nodes in the smart grid poses a huge threat to the privacy and security of user data, and at the same time, the limitation of the power bureau's computing resources also brings users response delay, service quality degradation and other problems, the author proposes the application of edge computing technology in smart grid data security. …”
Get full text
Article -
575
Review on security risks of key components in industrial control system
Published 2022-06-01“…With the rapid development of modern information technology and communication technology, industrial control system has become an important part of national key infrastructure, whose security is related to national strategic security and social stability.The close connection between modern industrial control system and Internet promotes the rapid progress of industrial control technology, meanwhile it brings serious security risks.Since the“Stuxnet” virus incident, attacks on industrial control systems have occurred frequently, which causes huge economic losses to global production enterprises.Besides, it also poses significant impact on the social stability and security to many countries and regions, which has aroused people’s great concern about the security of industrial control systems.Due to the wide variety of automation equipment and proprietary protocols, complex data flow and rapid development in modern industrial control system, it is very difficult to summarize the safety of key components of industrial control.There are few literatures related to this area, and most of them are old and incomplete.To solve the above problems, the mainstream architecture and related components of the current industrial control system were introduced.Then the security vulnerabilities and potential threats in the key industrial control components were analyzed.The attack methods of SCADA control center, programmable logic controller and field equipment were summarized.Furthermore, the preconditions, objects, steps and hazards of the attack in the literature in recent years were also analyzed.The attacks against industrial control network were classified from the perspective of integrity and confidentiality.Finally, the possible development trend of industrial control system attack was given.…”
Get full text
Article -
576
A hierarchy model on the research fields of cyberspace security technology
Published 2015-12-01Subjects: “…cyberspace security…”
Get full text
Article -
577
Design and implementation ofserver security alarm system in campus network
Published 2014-10-01Subjects: Get full text
Article -
578
Energy-Efficient Secure Path Algorithm for Wireless Sensor Networks
Published 2012-04-01“…To prolong the network lifetime, sensor nodes need a secure load-balancing route. In this paper, we investigate the facts of ensuring secure sensed data in a balanced energy network backbone, and propose energy-efficient secure path algorithm (ESPA) for WSNs. …”
Get full text
Article -
579
Performance analysis of physical layer security based on channel correlation
Published 2021-03-01“…In view of the correlation of the main and eavesdropper’s channels in physical layer security, the impact of channel correlation on the secrecy performance was studied, the exact form ulations of ergodic secrecy capacity and secrecy outage probability were derived, and then the asymptotic formulations in the scenarios where the channel states were large and small were given.The theoretical analysis were verified by the numerical simulations.The simulation results show that channel correlation will cause the loss of ergodic secrecy capacity, however, it does not mean the outage probability of communication will increase with high channel correlation.Actually, when the outage rate is set reasonably, the impact of channel correlation is related to the average signal-to-noise ratio (SNR) at the receiver end.At high SNR range, high correlation will decrease the outage probability, at low SNR range, high correlation will increase the outage probability, and at medium SNR range, the correlation will not affect the outage probability significantly.Based on the above conclusion, the parameters can be set according to SNR and correlation, so that the secrecy performance can be maintained.…”
Get full text
Article -
580
A Secure Image Transmission Scheme Based on Improved DCSK
Published 2013-06-01“…However, it is lack of performance in security, and easier to be cracked. A modified DCSK scheme was proposed for the security problems caused by the traditional DCSK scheme. …”
Get full text
Article