Showing 381 - 400 results of 9,720 for search '"security"', query time: 0.09s Refine Results
  1. 381
  2. 382
  3. 383

    System of subjects ensuring national security and defence of Ukraine by O. V. Nesterenko

    Published 2020-06-01
    Subjects: “…system of subject for ensuring the national security and defense…”
    Get full text
    Article
  4. 384

    Information security vulnerability scoring model for intelligent vehicles by Haiyang YU, Xiuzhen CHEN, Jin MA, Zhihong ZHOU, Shuning HOU

    Published 2022-02-01
    “…More and more electronic devices are integrated into the modern vehicles with the development of intelligent vehicles.There are various design flaws and vulnerabilities hidden in a large number of hardware, firmware and software.Therefore, the vulnerabilities of intelligent vehicles have become the most important factor affecting the vehicle safety.The safety of vehicles is seriously affected by the disclosure of a large number of vulnerabilities, and the wide application of smart cars is also restricted.Vulnerability management is an effective method to reduce the risk of vulnerabilities and improve vehicle security.And vulnerability scoring is one the important step in vulnerability management procedure.However, current method have no capability assessing automotive vulnerabilities reasonably.In order to handle this problem, a vulnerability scoring model for intelligent vehicles was proposed, which was based on CVSS.The attack vector and attack complexity were optimized, and property security, privacy security, functional safety and life safety were added to characterize the possible impact of the vulnerabilities according to the characteristics of intelligent vehicles.With the machine learning method, the parameters in CVSS scoring formula were optimized to describe the characteristics of intelligent vehicle vulnerabilities and adapt to the adjusted and new added weights.It is found in case study and statistics that the diversity and distribution of the model are better than CVSS, which means the model can better score different vulnerabilities.And then AHP is used to evaluate the vulnerability of the whole vehicle based on the vulnerability score of the model, a score is given representing the risk level of whole vehicle.The proposed model can be used to evaluate the severity of information security vulnerabilities in intelligent vehicles and assess the security risks of the entire vehicle or part of the system reasonably, which can provide an evidence for fixing the vulnerabilities or reinforcing the entire vehicle.…”
    Get full text
    Article
  5. 385
  6. 386

    Efficient and Secure Traffic Scheduling Based on Private Sketch by Yang Chen, Huishu Wu, Xuhao Ren

    Published 2025-01-01
    “…In this paper, we propose ESTS, an efficient and secure traffic scheduling based on private sketch, capable of identifying tail contributors to adjust routing and prevent congestion. …”
    Get full text
    Article
  7. 387

    Secure key-sharing algorithm based on smart grid by Wei GU, Jian SHEN, Yongjun REN

    Published 2021-08-01
    Subjects: “…smart grid security,…”
    Get full text
    Article
  8. 388
  9. 389

    Community Food Security and Florida Cooperative Extension Service by Alison E. Lutz, Nick T. Place, Mickie E. Swisher

    Published 2007-07-01
    “…Swisher, defines community food security and identifies its importance for extension agents in Florida. …”
    Get full text
    Article
  10. 390

    Development and Testing of Intelligent Alcohol Transportation Security System by Velaphi Msomi, Shandene E. A. Solomons

    Published 2018-01-01
    “…The development and testing of intelligent liquid transportation security system are being reported in this paper. The targeted fluid to be secured was ethanol alcohol and this was due to the theft cases occurring during the transportation of this product from the supplier to the customer. …”
    Get full text
    Article
  11. 391
  12. 392
  13. 393
  14. 394
  15. 395
  16. 396
  17. 397

    Artificial Intelligence and the Financial Security of the State on the Example of Poland by Elżbieta Feret

    Published 2024-12-01
    “…Recognising the need to use them, it is necessary to pay attention to ensuring the guarantee of the state’s financial security, which determines its independence of functioning. …”
    Get full text
    Article
  18. 398
  19. 399
  20. 400