Showing 401 - 420 results of 9,720 for search '"security"', query time: 0.07s Refine Results
  1. 401

    Multi-layered based network security defense system

    Published 2007-01-01
    “…A multi-layered based network security defense system(MNSDS) was presented.MNSDS adopts multi-layered detection technology: for the detection of IP layer,aggregate-based congestion control algorithm(ABCC) was adopted,narrowing the congestion signature,and thus minimizing collateral damage;then,it employs the detection technology based on the artificial immune principle in TCP and UDP layers AIPT,and detects intrusion by creating a rule database and matching the appropriate rule.The simulation results indicate that the system not only can provide relief from DoS/DDoS attacks equally,but also resolve problems existing in the current defense systems such as low speed high false positive probability and high false positive probability,poor real-time and more artificial interventions.…”
    Get full text
    Article
  2. 402
  3. 403

    Human Factors and Errors in Security Aviation: An Ergonomic Perspective by Michelle S. F. Arcúrio, Eliane S. Nakamura, Talita Armborst

    Published 2018-01-01
    “…In a previous study we have identified the incidence of human factors and errors in the security screening process, concerning the Brazilian civil aviation. …”
    Get full text
    Article
  4. 404
  5. 405
  6. 406
  7. 407
  8. 408

    Key security detection based on dynamic binary instrumentation by Hao LIN, Fei KANG, Yan GUANG

    Published 2017-11-01
    Subjects: “…key security detection…”
    Get full text
    Article
  9. 409
  10. 410
  11. 411

    Research on cloud storage systems supporting secure sharing by Yan SONG, Zhen HAN, Jian-jun LI, Lei HAN

    Published 2017-10-01
    “…A practical scheme for the cloud storage system was proposed to ensure security and efficiency during data sharing.The scheme which combine attribute-based encryption,proxy encryption with symmetric encryption,could integrate access control,efficient search with encryption well together.The scheme archived conjunctive-keyword non-field subset search by using bilinear mapping and polynomial equation.The scheme reduced the cost of decryption by outsourcing most of the decryption operations from the terminal to the cloud.At last,the performance was analyzed and an experiment was made for verification.…”
    Get full text
    Article
  12. 412

    Survey of attack graph based network security metric by Hao HU, Yuling LIU, Yuchen ZHANG, Hongqi ZHANG

    Published 2018-09-01
    Subjects: “…network security metric…”
    Get full text
    Article
  13. 413

    Secure communication mechanism for VSN based on certificateless signcryption by Wenbo ZHANG, Wenhua HUANG, Jingyu FENG

    Published 2021-07-01
    “…To solve the communication security problems of vehicular social network (VSN), an efficient certificateless signcryption scheme was proposed.The proposed scheme was proven secure in the random oracle model based on the computational Diffie-Hellman problem and elliptic curve discrete logarithm problem, which provided confidentiality and unforgeability protection for VSN members.In addition, when the pseudonym mechanism was used to solve the privacy protection problem in VSN, without installing tamper-proof device, a self-generation mechanism for vehicle pseudonyms and their keys was proposed.The performance analysis shows that the proposed scheme can decrease communication cost, and significantly reduce the computation overhead of the key generation center.…”
    Get full text
    Article
  14. 414
  15. 415
  16. 416

    Explainable Security Requirements Classification Through Transformer Models by Luca Petrillo, Fabio Martinelli, Antonella Santone, Francesco Mercaldo

    Published 2025-01-01
    “…Security and non-security requirements are two critical issues in software development. …”
    Get full text
    Article
  17. 417
  18. 418
  19. 419
  20. 420