-
121
-
122
Resource allocation algorithm for situation awareness based on multiple-choice quadratic knapsack
Published 2016-12-01“…In order to deal with the potential cyber-threat and improve the security situation by using limited resource properly, the optimal allocation of resource focused on cyber security situation. The coherence of network situation lead to the fact that the enhancement of certain item may also affect some other items, and different amount of investment may also result in different degree of impact, therefore, the problem was extracted into the multiple-choice quadratic knapsack problem. …”
Get full text
Article -
123
Research on security scenarios and security models for 6G networking
Published 2021-02-01“…The concept of 6G has been proposed and has attracted the wide attention of academe.Generally speaking, the 6G network will optimize the performance of 5G, and expand the network scenarios which are difficult to achieve within 5G.However, the introduction of new scenarios and technologies will also bring new security threats to cyber security.The research progress on the key technologies and implementation methods of the 6G were conducted.To summarize a vision of core technologies of 6G, the research work of major 5G/6G research institutions, companies and enterprises were focused on .On this basis, the possible security problems and security challenges in 6G network were put forward.Finally, according to the existing network techniques, the possible solutions and proposed a general security model for 6G networks were discussed.…”
Get full text
Article -
124
Tenchi warfare – modern military operations based on the “tenchijin” philosophy
Published 2025-01-01Get full text
Article -
125
Systems Thinking Safety Analysis: Nuclear Security Assessment of Physical Protection System in Nuclear Power Plants
Published 2013-01-01“…The physical protection system (PPS) is constructed by the cyber security evaluation tool (CSET) for the nuclear security assessment. …”
Get full text
Article -
126
Research and realization of the Trojan detection engine based on Android
Published 2016-10-01“…During recent years, Trojan viruses on Android systems have greatly evolved, and the frequent security breach of Android systems is rapidly becoming a great concern of contemporary cyber security. The study of Trojan virus detection on Android engine and the application of its outcome has become increasingly significant. …”
Get full text
Article -
127
-
128
Formation of the TNI Cyber Force: A Strategic and Policy Analysis
Published 2024-11-01“…This study focuses on the formation of the Indonesian National Army (TNI) Cyber Force as part of efforts to strengthen the country's cyber security in facing increasingly complex threats. …”
Get full text
Article -
129
Democracy and Fake News in the Age of Cyberspace
Published 2020-12-01“…Then, the relationship between the spread of fake news in cyberspace and the cyber security system that needs to be created against it and the social contract that needs to be rebuilt in today's societies are mentioned. …”
Get full text
Article -
130
-
131
Numerical Study on the Characteristics of Hydrogen Leakage, Diffusion and Ventilation in Ships
Published 2025-01-01Get full text
Article -
132
Dynamics and Control of Worm Epidemic Based on Mobile Networks by SEIQR-Type Model with Saturated Incidence Rate
Published 2021-01-01“…The mobile networks have increasingly facilitated our daily life but are also breeding grounds for malicious worms, which are considered as the main threat to cyber security. The purpose of this paper is to analyze the dynamics of worm propagation and to control the worm epidemic based on mobile-phone networks. …”
Get full text
Article -
133
A tensor compression algorithm using Tucker decomposition and dictionary dimensionality reduction
Published 2020-04-01Get full text
Article -
134
From threat to response: Cybersecurity evolution in Albania
Published 2025-01-01Get full text
Article -
135
Personal OAuth authorization server and push OAuth for Internet of Things
Published 2017-06-01Get full text
Article -
136
Deep Learning Integration in PAPR Reduction in 5G Filter Bank Multicarrier Systems
Published 2024-11-01Get full text
Article -
137
Digital Transformation: A Case Study of a Legal Firm in Sri Lanka and Its Impact
Published 2024-08-01“…The proposed comprehensive digital transformation addresses this gap by implementing a cloud-based Customer Relationship Management (CRM) System, integration of Artificial Intelligence (AI) for data handling, Case Analysis and Management Software, Legal Research Software, and enhancement of cyber security measures. Furthermore, the article proposes using advanced video conferencing tools to enhance client communication. …”
Get full text
Article -
138
Social Network Community-Discovery Algorithm Based on a Balance Factor
Published 2022-01-01Get full text
Article -
139
TPCM-based trusted PXE boot method for servers
Published 2020-12-01“…The PXE startup mechanism downloads operating system files through the network and starts the operating system,which is widely used in server network startup.It is widely used in server network startup.The PXE boot process is secured and trusted through trusted computing technology to prevent the PXE boot file from being tampered with maliciously,ensuring the safe and reliable operation of the server.The cyber security classified protection standard requires that the system boot program and system program of the server device be trusted and verified based on the trusted root.A TPCM-based server trusted PXE boot method based on the requirements of classified protection standard was proposed to ensure the security and trust of the server's BIOS firmware,PXE bootfiles,and Linux system files.When the server performs PXE boot,TPCM measured BIOS firmware,BIOS boot environment measured PXE boot files,and PXE boot environment measured Linux system files.Taking TPCM as the root of trust,one level of measurement,one level of trust,and a chain of trust were established to achieve a trusted server operating environment.The proposed method was tested on a domestically-controlled,self-controllable Shenwei server.The experimental results show that the proposed method is feasible.…”
Get full text
Article -
140
Determinants of digital bank transformation: a systematic literature review with prisma and bibliometrics
Published 2024-11-01“…The determinants in the digital bank transformation process include the level of digitalization, application user growth, IT investment, IT committee, cyber security, and ecosystem stocks. The results of this literature review will be a reference for further research related to digital banks, in line with the rapid digital transformation process in banking.…”
Get full text
Article