Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
161
Enhanced SDIoT Security Framework Models
Published 2016-05-01“…In order to address such problems, this study aims to investigate strategies for establishing a security framework for the configuration of a software-defined IoT environment and efficient provision of security services. …”
Get full text
Article -
162
Research on Android security of broadcasting mechanism
Published 2016-10-01“…In recent years, there has been increased interest in the research of Android component security. Broadcast receiver is one of the 4 components in Android, strangely enough, few papers have been published regarding to its security. …”
Get full text
Article -
163
Research and practice of SASE cloud security
Published 2022-01-01Subjects: “…cloud security…”
Get full text
Article -
164
Suggestions on cyber security talents cultivation
Published 2015-12-01Subjects: “…cyber security…”
Get full text
Article -
165
Application of computer vision in intelligent security
Published 2021-08-01Subjects: Get full text
Article -
166
Principles and Practices to Secure and Hold Interest
Published 2016-02-01“… Securing and holding student interest is a major challenge for teachers. …”
Get full text
Article -
167
New Aspects of National Security Startegy
Published 2012-12-01Subjects: “…military and political security…”
Get full text
Article -
168
The concept of security in German foreign policy
Published 2024-08-01Subjects: Get full text
Article -
169
-
170
Sustainable water reuse for water security
Published 2025-01-01Subjects: “…water security…”
Get full text
Article -
171
-
172
Research framework for food security and sustainability
Published 2025-01-01“…Abstract This article presents a framework for food security and sustainability research, developed by industry, academia, and public sector experts. …”
Get full text
Article -
173
Security test of 101 protocol of FTU
Published 2018-10-01“…The IEC60870-5-101 protocol is mainly used for transmitting messages between the primary station and the substation of the power SCADA data monitoring and acquisition system.Since the message mainly adopts “frame check and sum” to ensure communication security,there is a common security risk among the intermediate personnel.In order to verify the communication problems of the 101 protocol,the communication system between the FTU and the main station of the feeder terminal was constructed,which collected the telemetry signal of the FTU mobile IoT card on the cloud server,and used the man-in-the-middle attack mode to use the ARP to intercept the communication data packet.To analyze the telemetry information in the data packet,try data tampering and successfully make the monitoring data not updated in time.Finally,an enhancement mechanism against external attacks was proposed.…”
Get full text
Article -
174
-
175
Suggestions on cyber security talents cultivation
Published 2016-03-01Subjects: “…cyber security…”
Get full text
Article -
176
Data Security and Privacy in Cloud Computing
Published 2014-07-01“…Data security has consistently been a major issue in information technology. …”
Get full text
Article -
177
-
178
Food Security and Self-Sufficiency in Europe
Published 2017-12-01Subjects: “…food security…”
Get full text
Article -
179
Systems-thinking innovations for water security
Published 2025-01-01Subjects: Get full text
Article -
180