Showing 561 - 580 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 561
  2. 562

    Traffic planning of backbone link of quantum secure communication network by Lei YUAN, Meisheng ZHAO

    Published 2018-09-01
    Subjects: “…quantum secure communication network…”
    Get full text
    Article
  3. 563

    Discovery and research of network security vulnerabilities based on Web application by Xiao-shuang ZHANG, Yi-ling XU, Yuan LIU

    Published 2016-06-01
    “…Web security vulnerabilities can be divided into two categories,including security vulnerabilities Web platform and Web their own application.By analyzing the attack principle and process of Web application network security vulnerabilities,XSS vulnerability including type of the reflective,stored,and DOM,SQL injection vulner-ability and session authentication management vulnerability were studied.The corresponding preventive measures of the three kinds of vulnerabilities were put forward.…”
    Get full text
    Article
  4. 564
  5. 565

    ‘Bottom-up securitization’: A visual turn in security studies by M. A. Kucherov, M. V. Kharkevich

    Published 2024-03-01
    Subjects: “…international security…”
    Get full text
    Article
  6. 566
  7. 567

    Application of big data technology in enterprise information security management by Ping Li, Limin Zhang

    Published 2025-01-01
    Subjects: “…Enterprise information security…”
    Get full text
    Article
  8. 568

    A Secure Object Detection Technique for Intelligent Transportation Systems by Jueal Mia, M. Hadi Amini

    Published 2024-01-01
    “…Furthermore, this hybrid algorithm provides robust security against data poisoning-based model replacement and inference attacks throughout the training phase. …”
    Get full text
    Article
  9. 569
  10. 570

    Security-enhanced live migration based on SGX for virtual machine by Yuan SHI, Huan-guo ZHANG, Bo ZHAO, Zhao YU

    Published 2017-09-01
    “…The virtual machine may face the problem of information leakage in live migration.Therefore,a dynamic memory protection technique SGX was introduced and a security enhancement live migration method based on KVM environment was proposed.Firstly,on both sides of migration,a hardware-isolated secure execution environment centered SGX was built.It guaranteed the security of operations like encryption and integrity measurement and also ensured the security of private data.An encrypted channel to transfer migration data based on the remote attestation between the secure execution environments of both migration sides was constructed.And the mutual authentication of both sides’ platform integrity was realized.Finally,the security enhancement effect and did the experiment was analyzed.The results shows that the introduction of SGX won’t cause much negative effect to the migration performance.…”
    Get full text
    Article
  11. 571
  12. 572
  13. 573
  14. 574

    Application of edge computing technology in smart grid data security by Zhuo Cheng, Jiangxin Li, Jianjun Zhang, Chen Wang, Hui Wang, Juyin Wu

    Published 2025-02-01
    “…Absrtact: In order to solve the problem that the two-way flow of power and information between user nodes and service nodes in the smart grid poses a huge threat to the privacy and security of user data, and at the same time, the limitation of the power bureau's computing resources also brings users response delay, service quality degradation and other problems, the author proposes the application of edge computing technology in smart grid data security. …”
    Get full text
    Article
  15. 575

    Review on security risks of key components in industrial control system by Shijie TANG, Fang YUAN, Jun LI, Yong DING, Huiyong WANG

    Published 2022-06-01
    “…With the rapid development of modern information technology and communication technology, industrial control system has become an important part of national key infrastructure, whose security is related to national strategic security and social stability.The close connection between modern industrial control system and Internet promotes the rapid progress of industrial control technology, meanwhile it brings serious security risks.Since the“Stuxnet” virus incident, attacks on industrial control systems have occurred frequently, which causes huge economic losses to global production enterprises.Besides, it also poses significant impact on the social stability and security to many countries and regions, which has aroused people’s great concern about the security of industrial control systems.Due to the wide variety of automation equipment and proprietary protocols, complex data flow and rapid development in modern industrial control system, it is very difficult to summarize the safety of key components of industrial control.There are few literatures related to this area, and most of them are old and incomplete.To solve the above problems, the mainstream architecture and related components of the current industrial control system were introduced.Then the security vulnerabilities and potential threats in the key industrial control components were analyzed.The attack methods of SCADA control center, programmable logic controller and field equipment were summarized.Furthermore, the preconditions, objects, steps and hazards of the attack in the literature in recent years were also analyzed.The attacks against industrial control network were classified from the perspective of integrity and confidentiality.Finally, the possible development trend of industrial control system attack was given.…”
    Get full text
    Article
  16. 576

    A hierarchy model on the research fields of cyberspace security technology by Bin-xing FANG

    Published 2015-12-01
    Subjects: “…cyberspace security…”
    Get full text
    Article
  17. 577
  18. 578

    Energy-Efficient Secure Path Algorithm for Wireless Sensor Networks by Imanishimwe Jean de Dieu, Nyirabahizi Assouma, Maniraguha Muhamad, Wang Jin, Sungyoung Lee

    Published 2012-04-01
    “…To prolong the network lifetime, sensor nodes need a secure load-balancing route. In this paper, we investigate the facts of ensuring secure sensed data in a balanced energy network backbone, and propose energy-efficient secure path algorithm (ESPA) for WSNs. …”
    Get full text
    Article
  19. 579

    Performance analysis of physical layer security based on channel correlation by Xuanli WU, Zhicong XU, Yuchen WANG, Yong LI

    Published 2021-03-01
    “…In view of the correlation of the main and eavesdropper’s channels in physical layer security, the impact of channel correlation on the secrecy performance was studied, the exact form ulations of ergodic secrecy capacity and secrecy outage probability were derived, and then the asymptotic formulations in the scenarios where the channel states were large and small were given.The theoretical analysis were verified by the numerical simulations.The simulation results show that channel correlation will cause the loss of ergodic secrecy capacity, however, it does not mean the outage probability of communication will increase with high channel correlation.Actually, when the outage rate is set reasonably, the impact of channel correlation is related to the average signal-to-noise ratio (SNR) at the receiver end.At high SNR range, high correlation will decrease the outage probability, at low SNR range, high correlation will increase the outage probability, and at medium SNR range, the correlation will not affect the outage probability significantly.Based on the above conclusion, the parameters can be set according to SNR and correlation, so that the secrecy performance can be maintained.…”
    Get full text
    Article
  20. 580

    A Secure Image Transmission Scheme Based on Improved DCSK by Lifang He, Gang Zhang, Tianqi Zhang

    Published 2013-06-01
    “…However, it is lack of performance in security, and easier to be cracked. A modified DCSK scheme was proposed for the security problems caused by the traditional DCSK scheme. …”
    Get full text
    Article