Showing 121 - 140 results of 195 for search '"cyber security"', query time: 0.04s Refine Results
  1. 121
  2. 122

    Resource allocation algorithm for situation awareness based on multiple-choice quadratic knapsack by Yan-wei SUN, Yun-chuan GUO, Ling-cui ZHANG, Bin-xing FANG

    Published 2016-12-01
    “…In order to deal with the potential cyber-threat and improve the security situation by using limited resource properly, the optimal allocation of resource focused on cyber security situation. The coherence of network situation lead to the fact that the enhancement of certain item may also affect some other items, and different amount of investment may also result in different degree of impact, therefore, the problem was extracted into the multiple-choice quadratic knapsack problem. …”
    Get full text
    Article
  3. 123

    Research on security scenarios and security models for 6G networking by Chenglei ZHANG, Yulong FU, Hui LI, Jin CAO

    Published 2021-02-01
    “…The concept of 6G has been proposed and has attracted the wide attention of academe.Generally speaking, the 6G network will optimize the performance of 5G, and expand the network scenarios which are difficult to achieve within 5G.However, the introduction of new scenarios and technologies will also bring new security threats to cyber security.The research progress on the key technologies and implementation methods of the 6G were conducted.To summarize a vision of core technologies of 6G, the research work of major 5G/6G research institutions, companies and enterprises were focused on .On this basis, the possible security problems and security challenges in 6G network were put forward.Finally, according to the existing network techniques, the possible solutions and proposed a general security model for 6G networks were discussed.…”
    Get full text
    Article
  4. 124
  5. 125

    Systems Thinking Safety Analysis: Nuclear Security Assessment of Physical Protection System in Nuclear Power Plants by Tae Ho Woo

    Published 2013-01-01
    “…The physical protection system (PPS) is constructed by the cyber security evaluation tool (CSET) for the nuclear security assessment. …”
    Get full text
    Article
  6. 126

    Research and realization of the Trojan detection engine based on Android by Bin XIA, Feng QIU

    Published 2016-10-01
    “…During recent years, Trojan viruses on Android systems have greatly evolved, and the frequent security breach of Android systems is rapidly becoming a great concern of contemporary cyber security. The study of Trojan virus detection on Android engine and the application of its outcome has become increasingly significant. …”
    Get full text
    Article
  7. 127
  8. 128

    Formation of the TNI Cyber Force: A Strategic and Policy Analysis by Aris Sarjito

    Published 2024-11-01
    “…This study focuses on the formation of the Indonesian National Army (TNI) Cyber Force as part of efforts to strengthen the country's cyber security in facing increasingly complex threats. …”
    Get full text
    Article
  9. 129

    Democracy and Fake News in the Age of Cyberspace by Mariam Mohammed, Adem Bölükbaşı

    Published 2020-12-01
    “…Then, the relationship between the spread of fake news in cyberspace and the cyber security system that needs to be created against it and the social contract that needs to be rebuilt in today's societies are mentioned. …”
    Get full text
    Article
  10. 130
  11. 131
  12. 132

    Dynamics and Control of Worm Epidemic Based on Mobile Networks by SEIQR-Type Model with Saturated Incidence Rate by Rui Hu, Qingwu Gao, Bairong Wang

    Published 2021-01-01
    “…The mobile networks have increasingly facilitated our daily life but are also breeding grounds for malicious worms, which are considered as the main threat to cyber security. The purpose of this paper is to analyze the dynamics of worm propagation and to control the worm epidemic based on mobile-phone networks. …”
    Get full text
    Article
  13. 133
  14. 134
  15. 135
  16. 136
  17. 137

    Digital Transformation: A Case Study of a Legal Firm in Sri Lanka and Its Impact by Dulanjani Dissanayake, Kajini Pasadika Hapuarachchi Hapuarachchige, Yogesh Jindal

    Published 2024-08-01
    “…The proposed comprehensive digital transformation addresses this gap by implementing a cloud-based Customer Relationship Management (CRM) System, integration of Artificial Intelligence (AI) for data handling, Case Analysis and Management Software, Legal Research Software, and enhancement of cyber security measures. Furthermore, the article proposes using advanced video conferencing tools to enhance client communication. …”
    Get full text
    Article
  18. 138
  19. 139

    TPCM-based trusted PXE boot method for servers by Guojie LIU, Jianbiao ZHANG

    Published 2020-12-01
    “…The PXE startup mechanism downloads operating system files through the network and starts the operating system,which is widely used in server network startup.It is widely used in server network startup.The PXE boot process is secured and trusted through trusted computing technology to prevent the PXE boot file from being tampered with maliciously,ensuring the safe and reliable operation of the server.The cyber security classified protection standard requires that the system boot program and system program of the server device be trusted and verified based on the trusted root.A TPCM-based server trusted PXE boot method based on the requirements of classified protection standard was proposed to ensure the security and trust of the server's BIOS firmware,PXE bootfiles,and Linux system files.When the server performs PXE boot,TPCM measured BIOS firmware,BIOS boot environment measured PXE boot files,and PXE boot environment measured Linux system files.Taking TPCM as the root of trust,one level of measurement,one level of trust,and a chain of trust were established to achieve a trusted server operating environment.The proposed method was tested on a domestically-controlled,self-controllable Shenwei server.The experimental results show that the proposed method is feasible.…”
    Get full text
    Article
  20. 140

    Determinants of digital bank transformation: a systematic literature review with prisma and bibliometrics by Wahyu Avianto, Hermanto Siregar, Anny Ratnawati, Mulya E Siregar

    Published 2024-11-01
    “…The determinants in the digital bank transformation process include the level of digitalization, application user growth, IT investment, IT committee, cyber security, and ecosystem stocks. The results of this literature review will be a reference for further research related to digital banks, in line with the rapid digital transformation process in banking.…”
    Get full text
    Article