Showing 361 - 380 results of 529 for search '"information security"', query time: 0.05s Refine Results
  1. 361

    Self-similarity analysis of network threat time series by XUAN Lei, LU Xi-cheng, YU Rui-hou, ZHAO Xue-ming

    Published 2008-01-01
    “…The research outcome establishes the theory base to utilize the complex non-linearity system theory such as fractal and chaos to process the information security risk as-sessment and network threat prediction.…”
    Get full text
    Article
  2. 362

    التخزین السحابی للبیانات وأمن المعلومات " دراسة تقییمیة by د. ممدوح علی محمود

    Published 2016-10-01
    “…The study recommended that more research work shouldbe undertaken in the field of cloud storage, and the necessity of activating cloudstorage –taking the full information security precautions- in all institutions.…”
    Get full text
    Article
  3. 363
  4. 364
  5. 365

    Random Emission and Control of Whispering Gallery Mode Using Flexible Optical Fiber by Bingyang Cao, Zhen He, Weili Zhang

    Published 2025-01-01
    “…Additionally, the application of this laser in information security encryption is demonstrated and explored.…”
    Get full text
    Article
  6. 366

    Improving replicator dynamic evolutionary game model for selecting optimal defense strategies by Jianming HUANG, Hengwei ZHANG

    Published 2018-01-01
    “…In terms of the existence of strategy dependency in the same game group,network attack-defense evolutionary game model based on the improved replicator dynamics was constricted by introducing the intensity coefficient,which completed the method of calculating replicator dynamic rate.The improved replicator dynamic equation was adopted to solve the evolutionary equilibrium for the situation that both attack and defense have two optional strategies.The stability of the equilibrium points was analyzed by the local stability analysis method of Jacobian matrix,and the optimal defense strategies were obtained under different conditions.The results show that the strategy dependency between the players in the same group has a certain influence on the evolution of the game,both the incentive and the inhibition.Finally,the accuracy and validity of the model and method are verified by the experimental simulation,which provides a new theoretical support for solving the information security problems in the real.…”
    Get full text
    Article
  7. 367
  8. 368

    A secure authentication method based on hash function for RFID system by Chuan LI, Xuejun LI

    Published 2017-06-01
    “…Limited by the tag chip resource of a radio-frequency identification (RFID) system,the data and information security has been an important issue of an RFID system.The one-way Hash function provides an efficient and reliable approach for the identification and authentication of the RFID system.Based on the analysis of several typical Hash authentication protocols,a novel secure authentication protocol based on the Hash function was proposed.The protocol was intended to tackle the identification among the handheld RFID reader,tags and server.Specifically,the protocol utilizes the Hash function to achieve the mutual authentication between the above three objects.The performance analysis shows that the proposed protocol can resist the most known attacks with reduced storage capacity and lower computation overhead.Therefore,the proposed strategy effectively ensures the data and privacy security of the RFID system,achieving the bidirectional anonymous authentication between the terminal and server,which is very suitable for the distributed large-scale RFID system.…”
    Get full text
    Article
  9. 369
  10. 370

    Research progress of abnormal user detection technology in social network by Qiang QU, Hongtao YU, Ruiyang HUANG

    Published 2018-03-01
    “…In social networks,the problem of anomalous users detection is one of the key problems in network security research.The anomalous users conduct false comments,cyberbullying or cyberattacks by creating multiple vests,which seriously threaten the information security of normal users and the credit system of social networks ,so a large number of researchers conducted in-depth study of the issue.The research results of the issue in recent years were reviewed and an overall structure was summarized.The data collection layer introduces the data acquisition methods and related data sets,and the feature presentation layer expounds attribute features,content features,network features,activity features and auxiliary features.The algorithm selection layer introduces supervised algorithms,unsupervised algorithms and graph algorithms.The result evaluation layer elaborates the method of data annotation method and index.Finally,the future research direction in this field was looked forward.…”
    Get full text
    Article
  11. 371

    Digital media representation under complex number base and its application on information hiding by Wei CHEN, Ya-nan CHEN, IUYuan L

    Published 2016-12-01
    “…With the rapid development and wide application of the digital media technology,the information security problem is becoming more and more highly attention.Because of the various kinds of medias,previous research works have focused on a specific digital media from,such as text,image,audio and video.As a fact that all the objects were expressed in digital forms under the environment of computer and network,a unified form for all kinds of digital media under the complex number base system was proposed.The algorithm of the digital media signal and the complex number intercom version were given,so the relationship among the digital media could be converted to the corresponding geometric relationship on the complex plane.In the experiments,the proposed method was applied to the application of the digital media information hiding.…”
    Get full text
    Article
  12. 372

    Analysis of software defined security model and architecture by Chunmei GUO, Jun MA, Hao GUO, Xueyao BI, Ruhui ZHANG, Shaomin ZHU, Congyi YANG

    Published 2017-06-01
    “…Currently,most enterprises have deployed information security defense system based on policy access control.With cloud computing environment deployment and network attacking technology development,security has been regarded as one of the greatest problems in the cloud computing environment.The advanced persistent attacks including of bypassing the traditional firewall easily,breaking through the black and white list and feature matching of the security defense mechanism have included to the traditional security system new challenges.The problem in the traditional tightly coupled security defense system of combining the virtual with the true for construction of network environments was described,and a software defined security model and framework was provided.The decoupling scheme of access patterns and deployment position in combining the virtual with the true for construction of network environments was realized,which provided a beneficial exploration in the field of the adaptive active safety for enterprise cloud computing environment.…”
    Get full text
    Article
  13. 373

    Research Developments in Generative Adversarial Networks for Image Restoration and Communication by Zhou Peng

    Published 2025-01-01
    “…The GAN model is also widely used in the field of communication and information security. It proposes an End-to-End(E-to-E) communication encryption system based on Deep Convolutional GAN (DCGAN) to solve the secure transmission problem in wireless communication systems based on E-to-E learning. …”
    Get full text
    Article
  14. 374

    Security Management Technology of Multilayer Satellite Internet Based on Blockchain by Ruijie ZHU, Yudong ZHANG, Yating WEI, Chao XI

    Published 2022-03-01
    “…Satellite internet have the advantages of wide coverage, low latency, large transmission capacity and no geographical infl uence.It can provide ubiquitous internet access services for users all over the world.However, the heterogeneity of satellite internet and ground network, the channel opening and node exposure of satellite internet will pose a security threat to network access and resource management.Aiming at the security problem of satellite internet, a multilayer satellite internet security management architecture based on blockchain was proposed.As a distributed ledger technology, blockchain uses chain data structure to verify and store data, and adopts encryption methods to maintain that data blocks cannot be tampered.Blockchain can realize network security access, trusted resource management, and provide information security protection for satellite internet.This paper improved the security of satellite internet by integrating blockchain technology with satellite internet.…”
    Get full text
    Article
  15. 375

    Global Information Management Model and Identification Method Based on Deep Reinforcement Learning by RuiLe Lan, XiJia He

    Published 2021-01-01
    “…Therefore, the research on global information management models and identification methods in this article is based on the consideration of global information security and is to create a good global environment. …”
    Get full text
    Article
  16. 376

    On the Security of Certificateless Signature Schemes by Gaurav Sharma, Suman Bala, Anil K. Verma

    Published 2013-06-01
    “…CL-PKC has attracted special attention in the field of information security as it has opened new avenues for improvement in the present security architecture. …”
    Get full text
    Article
  17. 377

    Audio and Video Matching Zero-Watermarking Algorithm Based on NSCT by Di Fan, Wenxue Sun, Huiyuan Zhao, Wenshuo Kang, Changzhi Lv

    Published 2022-01-01
    “…In the Internet age, information security is threatened anytime and anywhere and the copyright protection of audio and video as well as the need for matching detection is increasingly strong. …”
    Get full text
    Article
  18. 378

    Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection by Rafał Kozik, Marek Pawlicki, Michał Choraś, Witold Pedrycz

    Published 2019-01-01
    “…Network and information security are regarded as some of the most pressing problems of contemporary economy, affecting both individual citizens and entire societies, making them a highlight for homeland security. …”
    Get full text
    Article
  19. 379
  20. 380

    RETRACTED: Parallel Encryption With Digit Arithmetic Of Covertext Model Using Duplicated Covertext by Hari Murti, Edy Supriyanto, Rara Redjeki, Eka Ardhianto

    Published 2022-12-01
    “…Covertext loops applied in PDAC can process information security. Another advantage obtained is that this modification makes it easier for users to use PDAC without having to meet the minimum covertext requirement.…”
    Get full text
    Article