Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5961
Hiszpańskie i niemieckie osiągnięcia w rozwoju energetyki odnawialnej: aspekt prawny
Published 2004-12-01“…Those measures are intended to help to attain objectives such as meeting the commitments given on climate change, environmentally sustainable security of supply, and promotion of renewable energy sources. …”
Get full text
Article -
5962
QGA-based network service extension algorithm in NFV
Published 2022-11-01“…To meet the client’s new business requirements or add additional security protection functions, the already hosted network service extension problem in the cloud network based on network function virtualization was researched.The network service extension in the cloud network was modeled as an integer linear programming, considering the impact on initial service, extended graph deployment, resource capacity and virtual network function affinity constraints, and so on.To deal with the computational complexity and dynamism of future large-scale cloud networks, a QGA-based network service extension algorithm was proposed to improve solution efficiency and solution quality through quantum parallel computing.Simulation results prove that the efficient performance of the proposed algorithm in terms of extension successful ratio and average resource costs, and the proposed algorithm has low time complexity.…”
Get full text
Article -
5963
A study on Pufferfish privacy algorithm based on Gaussian mixture models
Published 2025-01-01“…This research not only enriches the privacy protection strategies for mixture models but also offers new insights into the secure handling of complex data.…”
Get full text
Article -
5964
The impact of economic sanctions on the country's economy
Published 2021-07-01“…Currently, sanctions are considered an important tool of international policy for maintaining security and collective response to violations of international order. …”
Get full text
Article -
5965
Hydrogen Valleys – Energy transition and local development scenarios for medium-sized cities
Published 2024-06-01“…The project of territorial heritage regeneration, reinterpreted by settled communities as a potential energy network, meets the needs of the New Deal by guaranteeing secure and equitable energy. The paper aims to understand how medium-sized cities can contribute to the experimentation of decision-making processes and hydrogen design solutions. …”
Get full text
Article -
5966
Self-similarity analysis of network threat time series
Published 2008-01-01“…The research outcome establishes the theory base to utilize the complex non-linearity system theory such as fractal and chaos to process the information security risk as-sessment and network threat prediction.…”
Get full text
Article -
5967
Influence of industrial production of Russian regions on foreign trade indicators
Published 2023-03-01“…The chosen topic is relevant due to the fact that today’s sanctions policy of various Western countries is restricting exports and imports of many types of products, which can serve as a threat to the economic security of the Russian Federation. The author of the article determines the impact of mining, manufacturing, and the provision of electricity, gas and steam on foreign trade performance by using regression analysis of panel data and the Granger causality test. …”
Get full text
Article -
5968
L’économie politique de l’accès technique au marché : le cas du TAFTA
Published 2021-07-01“…It shows that technical market access talks constitute an institutionalized field of pre-market competition on which actors, situated at different spatial scales, rival in order to secure competitive advantage. The failure of the negotiations stems above all from each party’s attempt to unidirectionally extend its technical infrastructure to the other side of the Atlantic.…”
Get full text
Article -
5969
Genetic resources in Russia: from collections to bioresource centers
Published 2022-04-01“…Collections of bioresources and a set of technologies for their conservation, study and practical use are now the basis of bioeconomy, biosafety, and food security. It is the foundation underpinning production chains, leading from basic research to various technological areas and industries.An analysis of the current state and an assessment of the prospects for the development of bioresource collections in the Russian Federation are presented. …”
Get full text
Article -
5970
Research on service-driven network technologies for space-air-ground-sea integration
Published 2024-06-01“…Finally, the future development direction of space-air-ground-sea integration was discussed from the perspectives of intelligence, integration, and security.…”
Get full text
Article -
5971
The race for AI hegemony
Published 2025-02-01“…Without international coordination, the uncontrolled advance of AI could threaten security and social justice. An inclusive debate is essential to ensure the responsible use of this technology. …”
Get full text
Article -
5972
Key storage management scheme based on keyed hash tree with state
Published 2018-05-01“…To solve the problem of massive keys storage caused by multi-source data encryption in ciphertext retrieval system,a key storage scheme based on keyed hash tree with state was proposed.The scheme computes encryption key according to the root key and key derivation tree,and just needs to store the root key and the tree structure,which greatly reduces the key storage costs.In addition,the scheme manages key revocation according to the revocation state value,thereby solving the problem of key revocation and structure update.Strict security analysis shows that the partial data key disclosure does not leak the data confidentiality of remaining data,and the performance analysis using real-world dataset shows that the proposed key storage management scheme is acceptable in ciphertext retrieval system.…”
Get full text
Article -
5973
Data leakage prevention system based on transparent encryption for mobile terminal equipment
Published 2016-10-01“…With the trend that enterprise key data moves to mobile terminal,data leakage prevention has become an im-portant issue on mobile terminal.To solve the problem,a pre-decryption transparent encryption technology was set up which solved the problem that traditional transparent encryption technology only can ensure application layer security,in addition,performance on mobile was improved.At the same time,taking advantage of the idea of combining thin client and mobile terminal to prevent leakage of data,a virtual remote desktop technology on mobile was proposed,which completely shield the shortcomings of data transmission and ensure the safe transmission of mobile terminal data.Finally,a data leakage pre-vention system for mobile terminal was set up,which makes the mobile terminal fully and effectively protected.…”
Get full text
Article -
5974
Container intrusion detection method based on host system call frequency
Published 2021-08-01“…Container technology has become a widely used virtualization technology in cloud platform due to its lightweight virtualization characteristics.However, it shares the kernel with the host, so it has poor security and isolation, and is vulnerable to flood, denial of service, and escape attacks.In order to effectively detect whether the container is attacked or not, an intrusion detection method based on host system call frequency was proposed.This method took advantage of the different frequency of system call between different attack behaviors, collected the system call generated when the container was running, extracted the system call features by combining the sliding window and TF-IDF algorithm, and classified by comparing the feature similarity.The experimental results show that the detection rate of this method can reach 97%, and the false alarm rate is less than 4%.…”
Get full text
Article -
5975
Research on electromagnetic radiation based side-channel analysis method for hardware Trojan detection
Published 2021-04-01“…With the globalization of the integrated circuit industry, hardware Trojan is becoming the main threat to integrated circuits.At present, the side-channel analysis which can make a good trade-off between detection ability and cost, has attracted more attention from the academia.The side-channel analysis method based on electromagnetic radiation is one of the hotspots in hardware security field.The ability evaluation of electromagnetic radiation analysis method to detect hardware Trojan was focused, and the factor that limited their detection performance was explored.The experimental results on FPGA show that the electromagnetic radiation analysis method can effectively detect hardware Trojan whose electromagnetic radiation distribution is significantly different from surrounding circuits, but it cannot be applied to hardware Trojan with complex frequency distribution of electromagnetic radiation.…”
Get full text
Article -
5976
Research on 5G network deployment scheme for intelligent manufacturing
Published 2022-05-01“…Building smart factories based on 5G network and other new generation of advanced information technology is an important way for enabling industrial upgrading and realizing intelligent manufacturing.Firstly, the typical application scenario 5G network in intelligent manufacturing was analyzed and then the requirement of 5G network performance indicators was given.Based on these analysis, the specific deployment scheme of 5G network was design, including the high network capacity and large number of connections, high reliability and low delay, 5G slicing, toC/toB isolation and network security.The proposed 5G network deployment scheme provided a useful reference for the construction of smart factory based on 5G network and other advanced information technologies.…”
Get full text
Article -
5977
Mobile platform continuous authentication scheme based on gait characteristics
Published 2019-07-01“…The popularity of smart phones renders people extremely high requirements for safety.But the traditional one-time authentication method can’t continuously guarantee the security of equipment.To solve the problem,a continuous authentication scheme based on gait characteristics was proposed to realize the identification of current visitors.Moving average filtering,threshold-based useful information interception method and other operations were adopted to reduce noise interference.Template interception was used to maximize the utilization of information,and an optimal combination of time domain features and frequency domain features were proposed to reduce the storage space requirement of users’ information.Finally,the support vector machine realized the identity authentication function.Experiments show that the proposed scheme can effectively authenticate the identities of visitors.…”
Get full text
Article -
5978
Verifiable multi-keyword search scheme based on improved Merkle-Tree authentication method
Published 2020-09-01“…Aiming at the problem that the result verification method in the searchable encryption scheme was complicated,the search cost was high and the efficiency was low,it was difficult to meet the requirements of efficient verification and security of multi-keyword search results,a multi-keyword search scheme based on the improved Merkle-Tree authentication method was proposed.Firstly,a multi-keyword searchable algorithm was built to achieve efficient and accurate multi-keyword search by the bilinear mapping.Secondly,based on the improved Merkle-Tree authentication method of Bawa,the verification and dynamic update algorithm of the search scheme was constructed to reduce the calculation cost of the classic MHT to prevent the efficient verification and update of illegal operations such as data tampering,deletion,and forgery.Under the decision-type linear hypothesis and CDH hypothesis,the proof scheme meets the indistinguishability and unforgeability of ciphertext.…”
Get full text
Article -
5979
ACCOUNTING TREATMENT AND LEGISLATION OF LEASING ARRANGEMENTS
Published 2011-11-01“… Companies are not always able to purchase fixed assets required to start, expand or modernize their own operations, and also do not have adequate resources that could offer as security for bank loans. Leasing is the answer to such problems, as it provides the possibility of leasing recipient to obtain the necessary equipment. …”
Get full text
Article -
5980
Politi og arkitekters forebyggingslogikker: Forståelser av kriminalitetsforebyggende arbeid i offentlige rom
Published 2020-06-01“…The main aim is to examine approaches to crime prevention in public spaces in regards to safety, security, risk and social control.…”
Get full text
Article