-
401
Research on entity recognition and alignment of APT attack based on Bert and BiLSTM-CRF
Published 2022-06-01“…Objectives: In the face of the complex and changing network security environment, how to fight against Advanced Persistent Threat (APT) attacks has become an urgent problem for the entire security community. …”
Get full text
Article -
402
Presenting the Model of Effective Factors on Smart Governance in the Country
Published 2024-06-01“…In other words, equipment and infrastructure such as hardware, software, high-speed and secure internet, user-friendly designed websites and portals, resources such as sufficient financial and human resources, and most importantly securing this virtual space through the creation of functional ID, network security, design and the development of security laws, and finally the creation of mechanized databases in various fields and the formation of electronic statistics and information units in government organizations can help to provide a suitable platform for the establishment of smart governance in the country as effectively as possible.…”
Get full text
Article -
403
Research on secure routing algorithm in satellite networks
Published 2006-01-01“…The key technologies in satellite networks security were researched.A security routing algorithm was proposed.By static configuration combining together with dynamic adjustment,the algorithm realized dynamic routing.Based on the credence model,the security mechanism was added.When it found there was malicious behavior in the network,it would react actively.It effectively guaranteed the security of satellite networks and protectd the network from kinds of attacks.…”
Get full text
Article -
404
Trusted and anonymous authentication scheme for wireless networks
Published 2009-01-01“…A trusted and anonymous wireless authentication protocol was proposed by using of temporary identities and one time secret keys, both user identity and platform were authenticated under the proposed protocol.It has demonstrated that the proposed scheme is security and reliability, it can provide identity anonymity and platform anonymity, with domain separation property and key agreement process fairness, computation costs and turns of message exchange meet the demand for wireless IP networks security.…”
Get full text
Article -
405
Security Substrate Based Security Management and Control Mecbanism of Reconfigurable Network
Published 2014-07-01“…The definition of “security substrate”was given and the corresponding reconfigurable networks security model was illustrated. The construction of security services with multilevel security structure and security service establishment process via “security substrate”were put forward, which were key components of the security management and control architecture of reconfigurable network.…”
Get full text
Article -
406
Efficient attack detection and data aggregation algorithm
Published 2012-09-01“…An efficient algorithm of attack detection and data aggregation for wireless multimedia sensor networks based on the previous work was proposed.The proposed algorithm concludes the action trait of sensor nodes from their attribute vectors without any prior knowledge,at the same time;it was scalable and could be applied in large scale net-works.The simulation results show that the proposed algorithm can detect the attacks action more accurate than other technologies,and can make data aggregation efficiently.At the same time,the proposed algorithm can make the wireless multimedia sensor networks secure and reduce communication flow so that it will save a lot of resources in wireless mul-timedia sensor networks.…”
Get full text
Article -
407
New forgery attack on the authenticated cipher SCREAM and iSCREAM
Published 2016-01-01“…Authentication encryption algorithms have been widely used in networks security system since these al-gorithms can efficiently provide both privacy and integrity measurement for data transmission. …”
Get full text
Article -
408
Review on Social Media and Digital Security
Published 2022-07-01“…To address the challenge, this paper firstly made a survey on the state-of-the-art of social media networks security and trustworthiness particularly for the increasingly growing sophistication and variety of attacks as well as related intelligence applications. …”
Get full text
Article -
409
Secrecy Cognitive Gain of Cognitive Radio Sensor Networks with Primary Outage Constraint
Published 2015-06-01“…Then, the concept of secrecy cognitive gain is produced to highlight the effect of SR systems with secrecy on the whole networks security. Comparing with a single PR system, the SR system is beneficial to enhance the secrecy level for overlaid CRSNs. …”
Get full text
Article -
410
Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks
Published 2020-10-01“…Among the various technical challenges addressed by more than one decade of research in wireless sensor networks, security across wireless links is by far one of the most critical ones and relates to the need of guaranteeing reliability and trustiness of the collected data. …”
Get full text
Article -
411
Lightweight load-balanced and authentication scheme for a cluster-based wireless sensor network
Published 2021-02-01“…Therefore, this article effectively combines load balancing and security verification, and proposes a lightweight load balancing and verification scheme (secure load and energy balancing) based on clustered wireless sensor networks. Secure load and energy balancing implements cluster head’s authentication and confidentiality and integrity of all messages in load balancing. …”
Get full text
Article -
412
Application on Wireless Sensor Networks in Domestic and Hostile Environment
Published 2022-09-01“…WSNs are susceptible to many types of link layer attacks and most of traditional networks security techniques are unusable on WSNs due to wireless and shared nature of communication channel, untrusted transmissions, deployment in open environments, unattended nature and limited resources. …”
Get full text
Article -
413
VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION
Published 2014-06-01“…The United States is developing a complex strategy for cyber space that includes maximization of ICT's advantages in all strategically important fields as well as improvement of national information systems and networks security. On the international level the main task for the American diplomacy is to guarantee the U.S. information dominance. …”
Get full text
Article -
414
Enhanced Lightweight Quantum Key Distribution Protocol for Improved Efficiency and Security
Published 2025-01-01“…The proposed optimizations enhance post-processing efficiency and scalability, enabling practical deployment in bandwidth-limited environments like IoT networks, secure financial systems, and defense communications, thereby supporting broader adoption of quantum communication systems.…”
Get full text
Article