-
101
Network Intrusion Detection and Prevention System Using Hybrid Machine Learning with Supervised Ensemble Stacking Model
Published 2024-01-01“…The detection performance of the proposed hybrid intrusion detection system suggests that it can be deployed in network security applications to detect packets that exhibit suspicious behaviour or indicate potential threats and respond appropriately to attacks. …”
Get full text
Article -
102
Research on power plant security issues monitoring and fault detection using attention based LSTM model
Published 2025-01-01“…This will help to successfully enhance the security and service quality of the power data communication network, effectively cope with network security threats in the new environment, and ensure the security of the power plant network access. …”
Get full text
Article -
103
A Survey on Event Tracking in Social Media Data Streams
Published 2024-03-01“…Event tracking in social networks finds various applications, such as network security and societal governance, which involves analyzing data generated by user groups on social networks in real time. …”
Get full text
Article -
104
MANAGING FRAUD IN CONTEMPORARY BUSINESS ENVIRONMENT, THE ROLE OF INFORMATION SECURITY MANAGEMENT: A STUDY OF QUOTED DEPOSIT MONEY BANKS (DMBs) IN NIGERIA
Published 2024-05-01“…Utilizing a regression model, the research examines three key proxies of information security management: Application Security Control (ASC), Access/Authentication Control (AAC), and Network Security Control (NSC) and one proxy (Fraud risk governance - FRG) for fraud risk management The model reveals that both ASC and AAC have significant positive effects on FRG, with coefficients of 0.216 and 0.247, respectively, while NSC, with a coefficient of 0.080, does not significantly influence FRG. …”
Article -
105
Studi Empiris terhadap Kinerja & Keamanan Wifi (Studi Kasus di Kota Depok)
Published 2019-12-01“…Therefore, performance assessment and wifi network security in Depok City are considered to be good in accordance with the IEEE 802.11i standard which is about increasing security on Wifi networks using WPA2 and 802.11b regarding wifi channel settings that do not cause interference. …”
Get full text
Article -
106
-
107
Evaluasi Manajemen Keamanan Informasi Menggunakan Indeks Keamanan Informasi (KAMI) pada Jaringan (Studi Kasus: UIN Sunan Kalijaga Yogyakarta)
Published 2021-11-01“…Abstract Attacks on networks today are very common, with more and more ways to access data and the development of technology used, they will certainly cause an increase in network security threats. Evaluation of information security management using the information security index (KAMI) conducted on the network at UIN Sunan Kalijaga Yogyakarta obtained an index result of 407, which is considered still not optimal. …”
Get full text
Article -
108
A Review on Blockchain Applications in Operational Technology for Food and Agriculture Critical Infrastructure
Published 2025-01-01“…Blockchain technology (BT) has emerged as a transformative solution for addressing these challenges by enhancing network security, traceability, and system resilience. …”
Get full text
Article -
109
Survei Penelitian Metode Kecerdasan Buatan untuk Mendeteksi Ancaman Teknologi Serangan Siber
Published 2023-12-01“…The types of cyberattacks discussed in this study focus on attacks on the host system and the network security layer. In previous SLR research, these matters were discussed separately or even just one of them. …”
Get full text
Article -
110
Presenting the Model of Effective Factors on Smart Governance in the Country
Published 2024-06-01“…In other words, equipment and infrastructure such as hardware, software, high-speed and secure internet, user-friendly designed websites and portals, resources such as sufficient financial and human resources, and most importantly securing this virtual space through the creation of functional ID, network security, design and the development of security laws, and finally the creation of mechanized databases in various fields and the formation of electronic statistics and information units in government organizations can help to provide a suitable platform for the establishment of smart governance in the country as effectively as possible.…”
Get full text
Article -
111
Review on Social Media and Digital Security
Published 2022-07-01“…To address the challenge, this paper firstly made a survey on the state-of-the-art of social media networks security and trustworthiness particularly for the increasingly growing sophistication and variety of attacks as well as related intelligence applications. …”
Get full text
Article -
112
Secrecy Cognitive Gain of Cognitive Radio Sensor Networks with Primary Outage Constraint
Published 2015-06-01“…Then, the concept of secrecy cognitive gain is produced to highlight the effect of SR systems with secrecy on the whole networks security. Comparing with a single PR system, the SR system is beneficial to enhance the secrecy level for overlaid CRSNs. …”
Get full text
Article -
113
Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks
Published 2020-10-01“…Among the various technical challenges addressed by more than one decade of research in wireless sensor networks, security across wireless links is by far one of the most critical ones and relates to the need of guaranteeing reliability and trustiness of the collected data. …”
Get full text
Article -
114
Lightweight load-balanced and authentication scheme for a cluster-based wireless sensor network
Published 2021-02-01“…Therefore, this article effectively combines load balancing and security verification, and proposes a lightweight load balancing and verification scheme (secure load and energy balancing) based on clustered wireless sensor networks. Secure load and energy balancing implements cluster head’s authentication and confidentiality and integrity of all messages in load balancing. …”
Get full text
Article -
115
Application on Wireless Sensor Networks in Domestic and Hostile Environment
Published 2022-09-01“…WSNs are susceptible to many types of link layer attacks and most of traditional networks security techniques are unusable on WSNs due to wireless and shared nature of communication channel, untrusted transmissions, deployment in open environments, unattended nature and limited resources. …”
Get full text
Article -
116
VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION
Published 2014-06-01“…The United States is developing a complex strategy for cyber space that includes maximization of ICT's advantages in all strategically important fields as well as improvement of national information systems and networks security. On the international level the main task for the American diplomacy is to guarantee the U.S. information dominance. …”
Get full text
Article -
117
Enhanced Lightweight Quantum Key Distribution Protocol for Improved Efficiency and Security
Published 2025-01-01“…The proposed optimizations enhance post-processing efficiency and scalability, enabling practical deployment in bandwidth-limited environments like IoT networks, secure financial systems, and defense communications, thereby supporting broader adoption of quantum communication systems.…”
Get full text
Article