Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
401
Multi-layered based network security defense system
Published 2007-01-01“…A multi-layered based network security defense system(MNSDS) was presented.MNSDS adopts multi-layered detection technology: for the detection of IP layer,aggregate-based congestion control algorithm(ABCC) was adopted,narrowing the congestion signature,and thus minimizing collateral damage;then,it employs the detection technology based on the artificial immune principle in TCP and UDP layers AIPT,and detects intrusion by creating a rule database and matching the appropriate rule.The simulation results indicate that the system not only can provide relief from DoS/DDoS attacks equally,but also resolve problems existing in the current defense systems such as low speed high false positive probability and high false positive probability,poor real-time and more artificial interventions.…”
Get full text
Article -
402
Survey of IoT security research: threats, detection and defense
Published 2021-08-01Subjects: Get full text
Article -
403
Human Factors and Errors in Security Aviation: An Ergonomic Perspective
Published 2018-01-01“…In a previous study we have identified the incidence of human factors and errors in the security screening process, concerning the Brazilian civil aviation. …”
Get full text
Article -
404
Method for router online security risk assessment quantification
Published 2013-11-01Subjects: “…router security…”
Get full text
Article -
405
Service security monitoring mechanism for application server cluster
Published 2016-06-01Subjects: Get full text
Article -
406
THE IMPLICATIONS OF BREXIT FOR THE EU’S SECURITY AND DEFENCE ACTORNESS IN THE WORLD
Published 2021-08-01Subjects: Get full text
Article -
407
Identification of ecological security pattern in the Qinghai-Tibet Plateau
Published 2025-01-01Subjects: Get full text
Article -
408
Key security detection based on dynamic binary instrumentation
Published 2017-11-01Subjects: “…key security detection…”
Get full text
Article -
409
Securing the EU’s External Periphery: Role of the South Caucasus
Published 2011-12-01Get full text
Article -
410
Cloud Security Certification Technology Based on Fingerprint Recognition
Published 2015-08-01Subjects: Get full text
Article -
411
Research on cloud storage systems supporting secure sharing
Published 2017-10-01“…A practical scheme for the cloud storage system was proposed to ensure security and efficiency during data sharing.The scheme which combine attribute-based encryption,proxy encryption with symmetric encryption,could integrate access control,efficient search with encryption well together.The scheme archived conjunctive-keyword non-field subset search by using bilinear mapping and polynomial equation.The scheme reduced the cost of decryption by outsourcing most of the decryption operations from the terminal to the cloud.At last,the performance was analyzed and an experiment was made for verification.…”
Get full text
Article -
412
Survey of attack graph based network security metric
Published 2018-09-01Subjects: “…network security metric…”
Get full text
Article -
413
Secure communication mechanism for VSN based on certificateless signcryption
Published 2021-07-01“…To solve the communication security problems of vehicular social network (VSN), an efficient certificateless signcryption scheme was proposed.The proposed scheme was proven secure in the random oracle model based on the computational Diffie-Hellman problem and elliptic curve discrete logarithm problem, which provided confidentiality and unforgeability protection for VSN members.In addition, when the pseudonym mechanism was used to solve the privacy protection problem in VSN, without installing tamper-proof device, a self-generation mechanism for vehicle pseudonyms and their keys was proposed.The performance analysis shows that the proposed scheme can decrease communication cost, and significantly reduce the computation overhead of the key generation center.…”
Get full text
Article -
414
Research on Intelligent Security Access Platform Based on SDN
Published 2023-09-01Subjects: Get full text
Article -
415
Economic Security in Border Areas: The Fulfillment of Community Welfare
Published 2024-10-01Subjects: “…economic security…”
Get full text
Article -
416
Explainable Security Requirements Classification Through Transformer Models
Published 2025-01-01“…Security and non-security requirements are two critical issues in software development. …”
Get full text
Article -
417
Technology and practice of intelligent governance for financial data security
Published 2023-06-01Subjects: “…financial data security…”
Get full text
Article -
418
Preliminary Study on the Security Domain Transformation of SMS Platform
Published 2013-08-01Subjects: Get full text
Article -
419
Secure topology protocol for mobile peer-to-peer networks
Published 2010-01-01Subjects: Get full text
Article -
420
Vaccinations for Hajj: Enhancing health and global health security
Published 2025-01-01Subjects: Get full text
Article