Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
421
Study and implementation of integrated network security monitoring system
Published 2003-01-01“…As the kernel of integrated network security and defense system, the prototype of NSMS has already been developed and tested, it is proved to be efficient, open and practical in network security monitoring.…”
Get full text
Article -
422
Secure federated distillation GAN for CIDS in industrial CPS
Published 2023-12-01“…Aiming at the data island problem caused by the imperativeness of confidentiality of sensitive information, a secure and collaborative intrusion detection system (CIDS) for industrial cyber physical systems (CPS) was proposed, called PFD-GAN.Specifically, a novel semi-supervised intrusion detection model was firstly developed by improving external classifier-generative adversarial network (EC-GAN) with Wasserstein distance and label condition, to strengthen the classification performance through the use of synthetic data.Furthermore, local differential privacy (LDP) technology was incorporated into the training process of developed EC-GAN to prevent sensitive information leakage and ensure privacy and security in collaboration.Moreover, a decentralized federated distillation (DFD)-based collaboration was designed, allowing multiple industrial CPS to collectively build a comprehensive intrusion detection system (IDS) to recognize the threats under the entire cyber systems without sharing a uniform template model.Experimental evaluation and theory analysis demonstrate that the proposed PFD-GAN is secure from the threats of privacy leaking and highly effective in detecting various types of attacks on industrial CPS.…”
Get full text
Article -
423
Analysis on the status and development of quantum secure communication standardization
Published 2018-01-01Subjects: Get full text
Article -
424
Secure and efficient two-party ECDSA signature scheme
Published 2021-02-01“…To solve the easy disclosure of signature private key and excessive concentration of signature rights, a secure and efficient two-party ECDSA signature scheme was proposed for the blockchain based network trading systems.By pre-computing one-time pad Beaver’s triple, and utilizing the Beaver’s triple based secure two-party multiplication technology, some computationally intensive homomorphic encryption operations and oblivious transfer operations with high communication overhead were effectively avoided, and thereby an efficient two-party ECDSA signing was realized, which could ensure that the two signing parties output valid ECDSA signature without reconstructing the complete private key.The proposed scheme was proved to be provably secure under the hybrid model of the universally composable framework.Theoretical analysis and simulation results demonstrate that the proposed scheme has significant advantages in terms of signing efficiency and bandwidth requirements when compared with the existing two two-party ECDSA signature schemes.…”
Get full text
Article -
425
Construction of Information Security System of Power Generation Enterprise
Published 2014-01-01Subjects: Get full text
Article -
426
EU’s strategy and practice of 5G network security
Published 2020-06-01Subjects: Get full text
Article -
427
Secure Multicast Routing Algorithm for Wireless Mesh Networks
Published 2016-01-01“…Existing secure routing protocols that address different active attacks are still vulnerable due to subtle nature of flaws in protocol design. …”
Get full text
Article -
428
Residential Property Value and Security Features in Gated Communities
Published 2016-12-01Subjects: “…Gated community, Lagos, Nigeria, Residential property value, Security features, Willingness to pay…”
Get full text
Article -
429
Human resources development in farming and fisheries for food security
Published 2025-01-01“…The article delves into the issues of providing food security in the Maldives, a nation that regularly faces adverse weather conditions and natural disasters. …”
Get full text
Article -
430
Quantum information course for the undergraduate students of cyber security
Published 2019-06-01Subjects: Get full text
Article -
431
Robust deployment strategy for security data collection agent
Published 2019-06-01Subjects: Get full text
Article -
432
Survey on vertical federated learning: algorithm, privacy and security
Published 2023-04-01Subjects: Get full text
Article -
433
Turkey's National Security Perceptions in the Early Republican Period
Published 2022-12-01Get full text
Article -
434
A Secure and Fair Joint E-Lottery Protocol
Published 2014-01-01“…In this paper, we use the multisignature and verifiable random function to construct a secure and fair joint e-lottery scheme. The players can check the lottery integrity, and the winning numbers can be verified publicly.…”
Get full text
Article -
435
Security sharing scheme for encrypted data in cloud storage
Published 2015-10-01“…With the convenient of storing and sharing data in cloud storage environment,the concerns about data security arised as well.To achieve data security on untrusted servers,user usually stored the encrypted data on the cloud storage environment.How to build a cipertext-based access control scheme became a pot issue.For the access control problems of ciphertext in cloud storage environment,a CP-ABE based data sharing scheme was proposed.Novel key generation and distribution strategies were proposed to reduce the reliance on a trusted third party.Personal information was added in decryption key to resistant conclusion attacks at the same time.Moreover,key revocation scheme was proposed to provide the data backward secrecy.The security and implement analysis proves that proposed scheme is suit for the real application environment.…”
Get full text
Article -
436
Geopolitical choice of the national security ideology: the example of Ukraine
Published 2023-04-01Subjects: Get full text
Article -
437
Meaning and Vision of Mimic Computing and Mimic Security Defense
Published 2014-07-01Subjects: Get full text
Article -
438
Ensuring Security for the Participants of Criminal Proceedings: Forensic Aspects
Published 2020-12-01Subjects: Get full text
Article -
439
Legal aspects of functional security standardisation of the Internet of Things
Published 2023-09-01Subjects: Get full text
Article -
440
Data fusion protocol with source security for sensor networks
Published 2010-01-01Subjects: Get full text
Article