Showing 161 - 180 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 161

    Enhanced SDIoT Security Framework Models by Seongho Choi, Jin Kwak

    Published 2016-05-01
    “…In order to address such problems, this study aims to investigate strategies for establishing a security framework for the configuration of a software-defined IoT environment and efficient provision of security services. …”
    Get full text
    Article
  2. 162

    Research on Android security of broadcasting mechanism by Sihan QING

    Published 2016-10-01
    “…In recent years, there has been increased interest in the research of Android component security. Broadcast receiver is one of the 4 components in Android, strangely enough, few papers have been published regarding to its security. …”
    Get full text
    Article
  3. 163
  4. 164

    Suggestions on cyber security talents cultivation by Hui LI, Ning ZHANG

    Published 2015-12-01
    Subjects: “…cyber security…”
    Get full text
    Article
  5. 165
  6. 166

    Principles and Practices to Secure and Hold Interest by R. Kirby Barrick, Andrew C. Thoron

    Published 2016-02-01
    “… Securing and holding student interest is a major challenge for teachers. …”
    Get full text
    Article
  7. 167

    New Aspects of National Security Startegy by V. I. Mizin

    Published 2012-12-01
    Subjects: “…military and political security…”
    Get full text
    Article
  8. 168
  9. 169
  10. 170
  11. 171
  12. 172

    Research framework for food security and sustainability by Effie Papargyropoulou, John Ingram, Guy M. Poppy, Tom Quested, Clara Valente, Lee Ann Jackson, Tim Hogg, Thom Achterbosch, Emanuele Paolo Sicuro, Susanne Bryngelsson, Isabelle Guelinckx, Peter Van Dael, Louise Dye

    Published 2025-01-01
    “…Abstract This article presents a framework for food security and sustainability research, developed by industry, academia, and public sector experts. …”
    Get full text
    Article
  13. 173

    Security test of 101 protocol of FTU by Yong WANG, Xiang WANG, Wenting HE, Yuhao ZHOU, Yufan CAI

    Published 2018-10-01
    “…The IEC60870-5-101 protocol is mainly used for transmitting messages between the primary station and the substation of the power SCADA data monitoring and acquisition system.Since the message mainly adopts “frame check and sum” to ensure communication security,there is a common security risk among the intermediate personnel.In order to verify the communication problems of the 101 protocol,the communication system between the FTU and the main station of the feeder terminal was constructed,which collected the telemetry signal of the FTU mobile IoT card on the cloud server,and used the man-in-the-middle attack mode to use the ARP to intercept the communication data packet.To analyze the telemetry information in the data packet,try data tampering and successfully make the monitoring data not updated in time.Finally,an enhancement mechanism against external attacks was proposed.…”
    Get full text
    Article
  14. 174
  15. 175
  16. 176

    Data Security and Privacy in Cloud Computing by Yunchuan Sun, Junsheng Zhang, Yongping Xiong, Guangyu Zhu

    Published 2014-07-01
    “…Data security has consistently been a major issue in information technology. …”
    Get full text
    Article
  17. 177
  18. 178
  19. 179
  20. 180