-
181
A Proposal for a Zero-Trust-Based Multi-Level Security Model and Its Security Controls
Published 2025-01-01Get full text
Article -
182
A novel minimal exposure path problem in wireless sensor networks and its solution algorithm
Published 2016-08-01Get full text
Article -
183
Investigation Methodology of a Virtual Desktop Infrastructure for IoT
Published 2015-01-01Get full text
Article -
184
An Image Sharing Encryption Management System For Kabale University.
Published 2024“…Information security has been the most common word uttered by any man any device or any peripheral for the past two centuries. …”
Get full text
Thesis -
185
Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks
Published 2021-01-01“…With the development of distributed networks, the remote controllability of the distributed energy objects and the vulnerability of user-side information security protection measures make distributed energy objects extremely vulnerable to malicious control by attackers. …”
Get full text
Article -
186
Strongly Unforgeable Ring Signature Scheme from Lattices in the Standard Model
Published 2014-01-01Get full text
Article -
187
IRMAOC: an interpretable role mining algorithm based on overlapping clustering
Published 2025-01-01Get full text
Article -
188
Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks
Published 2014-04-01Get full text
Article -
189
-
190
Analyzing, Modeling, and Simulation for Human Dynamics in Social Network
Published 2012-01-01Get full text
Article -
191
Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks
Published 2013-01-01Get full text
Article -
192
A SURVEY OF NETWORK SERVICE LOG PROCESSING PLATFORMS AND TECHNIQUES FOR THE DETECTION OF INFORMATION INSECURITY RISKS
Published 2018-07-01“…In the layers of information security measures, the monitoring and detection measures of anomalous activities and information insecurity risks are considered the second defense layer behind firewalls and access controls. …”
Get full text
Article -
193
Malware Detection in Self-Driving Vehicles Using Machine Learning Algorithms
Published 2020-01-01Get full text
Article -
194
Global Detection of Live Virtual Machine Migration Based on Cellular Neural Networks
Published 2014-01-01Get full text
Article -
195
A Security Authentication Protocol for Trusted Domains in an Autonomous Decentralized System
Published 2016-03-01Get full text
Article -
196
Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure
Published 2014-01-01Get full text
Article -
197
RUSSIA IN THE GLOBAL INFORMATION SOCIETY
Published 2016-06-01“…Russian diplomacy is trying to foster the development of global rules regulating the information society and information security based on respect for sovereignty and equality of states. …”
Get full text
Article -
198
المعاییر الدولیة لسیاسات أمن المعلومات: دراسة تحلیلیة لمعاییر المنظمة الدولیة للتوحید القیاسی (آیزو27002 : ISO/IEC 27002) ومدى تطبیقها فی الجامعات العربیة...
Published 2015-04-01“…A checklist of analysis parameters of information security is applied for the best Arab universities websites. …”
Get full text
Article -
199
A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks
Published 2014-01-01Get full text
Article -
200
On Stability of Multi-Valued Nonlinear Feedback Shift Registers
Published 2019-01-01Get full text
Article