-
361
Self-similarity analysis of network threat time series
Published 2008-01-01“…The research outcome establishes the theory base to utilize the complex non-linearity system theory such as fractal and chaos to process the information security risk as-sessment and network threat prediction.…”
Get full text
Article -
362
التخزین السحابی للبیانات وأمن المعلومات " دراسة تقییمیة
Published 2016-10-01“…The study recommended that more research work shouldbe undertaken in the field of cloud storage, and the necessity of activating cloudstorage –taking the full information security precautions- in all institutions.…”
Get full text
Article -
363
-
364
An Adaptive Time-Stepping Algorithm for the Allen–Cahn Equation
Published 2022-01-01Get full text
Article -
365
Random Emission and Control of Whispering Gallery Mode Using Flexible Optical Fiber
Published 2025-01-01“…Additionally, the application of this laser in information security encryption is demonstrated and explored.…”
Get full text
Article -
366
Improving replicator dynamic evolutionary game model for selecting optimal defense strategies
Published 2018-01-01“…In terms of the existence of strategy dependency in the same game group,network attack-defense evolutionary game model based on the improved replicator dynamics was constricted by introducing the intensity coefficient,which completed the method of calculating replicator dynamic rate.The improved replicator dynamic equation was adopted to solve the evolutionary equilibrium for the situation that both attack and defense have two optional strategies.The stability of the equilibrium points was analyzed by the local stability analysis method of Jacobian matrix,and the optimal defense strategies were obtained under different conditions.The results show that the strategy dependency between the players in the same group has a certain influence on the evolution of the game,both the incentive and the inhibition.Finally,the accuracy and validity of the model and method are verified by the experimental simulation,which provides a new theoretical support for solving the information security problems in the real.…”
Get full text
Article -
367
A Discourse Coherence Analysis Method Combining Sentence Embedding and Dimension Grid
Published 2021-01-01Get full text
Article -
368
A secure authentication method based on hash function for RFID system
Published 2017-06-01“…Limited by the tag chip resource of a radio-frequency identification (RFID) system,the data and information security has been an important issue of an RFID system.The one-way Hash function provides an efficient and reliable approach for the identification and authentication of the RFID system.Based on the analysis of several typical Hash authentication protocols,a novel secure authentication protocol based on the Hash function was proposed.The protocol was intended to tackle the identification among the handheld RFID reader,tags and server.Specifically,the protocol utilizes the Hash function to achieve the mutual authentication between the above three objects.The performance analysis shows that the proposed protocol can resist the most known attacks with reduced storage capacity and lower computation overhead.Therefore,the proposed strategy effectively ensures the data and privacy security of the RFID system,achieving the bidirectional anonymous authentication between the terminal and server,which is very suitable for the distributed large-scale RFID system.…”
Get full text
Article -
369
Sensor Resource Sharing Approaches in Sensor-Cloud Infrastructure
Published 2014-04-01Get full text
Article -
370
Research progress of abnormal user detection technology in social network
Published 2018-03-01“…In social networks,the problem of anomalous users detection is one of the key problems in network security research.The anomalous users conduct false comments,cyberbullying or cyberattacks by creating multiple vests,which seriously threaten the information security of normal users and the credit system of social networks ,so a large number of researchers conducted in-depth study of the issue.The research results of the issue in recent years were reviewed and an overall structure was summarized.The data collection layer introduces the data acquisition methods and related data sets,and the feature presentation layer expounds attribute features,content features,network features,activity features and auxiliary features.The algorithm selection layer introduces supervised algorithms,unsupervised algorithms and graph algorithms.The result evaluation layer elaborates the method of data annotation method and index.Finally,the future research direction in this field was looked forward.…”
Get full text
Article -
371
Digital media representation under complex number base and its application on information hiding
Published 2016-12-01“…With the rapid development and wide application of the digital media technology,the information security problem is becoming more and more highly attention.Because of the various kinds of medias,previous research works have focused on a specific digital media from,such as text,image,audio and video.As a fact that all the objects were expressed in digital forms under the environment of computer and network,a unified form for all kinds of digital media under the complex number base system was proposed.The algorithm of the digital media signal and the complex number intercom version were given,so the relationship among the digital media could be converted to the corresponding geometric relationship on the complex plane.In the experiments,the proposed method was applied to the application of the digital media information hiding.…”
Get full text
Article -
372
Analysis of software defined security model and architecture
Published 2017-06-01“…Currently,most enterprises have deployed information security defense system based on policy access control.With cloud computing environment deployment and network attacking technology development,security has been regarded as one of the greatest problems in the cloud computing environment.The advanced persistent attacks including of bypassing the traditional firewall easily,breaking through the black and white list and feature matching of the security defense mechanism have included to the traditional security system new challenges.The problem in the traditional tightly coupled security defense system of combining the virtual with the true for construction of network environments was described,and a software defined security model and framework was provided.The decoupling scheme of access patterns and deployment position in combining the virtual with the true for construction of network environments was realized,which provided a beneficial exploration in the field of the adaptive active safety for enterprise cloud computing environment.…”
Get full text
Article -
373
Research Developments in Generative Adversarial Networks for Image Restoration and Communication
Published 2025-01-01“…The GAN model is also widely used in the field of communication and information security. It proposes an End-to-End(E-to-E) communication encryption system based on Deep Convolutional GAN (DCGAN) to solve the secure transmission problem in wireless communication systems based on E-to-E learning. …”
Get full text
Article -
374
Security Management Technology of Multilayer Satellite Internet Based on Blockchain
Published 2022-03-01“…Satellite internet have the advantages of wide coverage, low latency, large transmission capacity and no geographical infl uence.It can provide ubiquitous internet access services for users all over the world.However, the heterogeneity of satellite internet and ground network, the channel opening and node exposure of satellite internet will pose a security threat to network access and resource management.Aiming at the security problem of satellite internet, a multilayer satellite internet security management architecture based on blockchain was proposed.As a distributed ledger technology, blockchain uses chain data structure to verify and store data, and adopts encryption methods to maintain that data blocks cannot be tampered.Blockchain can realize network security access, trusted resource management, and provide information security protection for satellite internet.This paper improved the security of satellite internet by integrating blockchain technology with satellite internet.…”
Get full text
Article -
375
Global Information Management Model and Identification Method Based on Deep Reinforcement Learning
Published 2021-01-01“…Therefore, the research on global information management models and identification methods in this article is based on the consideration of global information security and is to create a good global environment. …”
Get full text
Article -
376
On the Security of Certificateless Signature Schemes
Published 2013-06-01“…CL-PKC has attracted special attention in the field of information security as it has opened new avenues for improvement in the present security architecture. …”
Get full text
Article -
377
Audio and Video Matching Zero-Watermarking Algorithm Based on NSCT
Published 2022-01-01“…In the Internet age, information security is threatened anytime and anywhere and the copyright protection of audio and video as well as the need for matching detection is increasingly strong. …”
Get full text
Article -
378
Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection
Published 2019-01-01“…Network and information security are regarded as some of the most pressing problems of contemporary economy, affecting both individual citizens and entire societies, making them a highlight for homeland security. …”
Get full text
Article -
379
Covert Channel Construction Method Based on HTTP Composite Protocols
Published 2022-01-01Get full text
Article -
380
RETRACTED: Parallel Encryption With Digit Arithmetic Of Covertext Model Using Duplicated Covertext
Published 2022-12-01“…Covertext loops applied in PDAC can process information security. Another advantage obtained is that this modification makes it easier for users to use PDAC without having to meet the minimum covertext requirement.…”
Get full text
Article