Showing 481 - 500 results of 9,720 for search '"security"', query time: 0.07s Refine Results
  1. 481

    Theoretical and Practical Fundamentals for Armenia’s National Security Strategy by K. P. Marabyan

    Published 2013-02-01
    Subjects: “…the national security strategy…”
    Get full text
    Article
  2. 482
  3. 483
  4. 484
  5. 485

    CONCEPTUAL MODELLING AND ORGANIZATION OF SECURITY MECHANISMS IN DISTRIBUTED SYSTEMS by T. Galibus, V. Krasnoproshin

    Published 2016-10-01
    “…We analyze the existing DS from the point of security and construct a two-level hierarchy of models. …”
    Get full text
    Article
  6. 486
  7. 487
  8. 488
  9. 489

    Spatial changes management in order to ensure economic security by O. В. Kozhevina

    Published 2020-04-01
    Subjects: “…economic security…”
    Get full text
    Article
  10. 490
  11. 491
  12. 492
  13. 493

    Efficient identification protocol provably secure in standard model by LI Yan-ping1, WANG Yu-min1

    Published 2009-01-01
    “…The new identification protocol is proven secure against impersonation under concurrent reset attack setting in standard model. …”
    Get full text
    Article
  14. 494
  15. 495

    SSDHT:social network-based secure DHT mechanism by Panpan LI, Zhengxia XIE, Guangxue YUE, Bolin MA, Li CHEN, Jianhua LIU

    Published 2018-11-01
    “…P2P systems have been widely used in the field of file sharing,etc.However,DHT (distributed hash table) networks have no center,no authentication,and lack of node authentication mechanism,making existing DHT-based P2P systems vulnerable to external attacks such as Sybil attacks.A DHT security enhancement mechanism based on social network was proposed,which introduced the trust relationship of nodes in the social network into the DHT network to improve the recognition ability of Sybil nodes.The KAD (Kademlia) algorithm was used as an example to verify the experiment.Experimental results based on Facebook and Twitter datasets show that the proposed security mechanism is suitable for large-scale dynamic networks and can effectively defend against Sybil attacks.…”
    Get full text
    Article
  16. 496

    Application of artificial intelligence technology in the field of security vulnerability by Hongyu SUN, Yuan HE, Jice WANG, Ying DONG, Lipeng ZHU, He WANG, Yuqing ZHANG

    Published 2018-08-01
    “…The large number of software and the enhancement of complexity have brought severe challenges to the research of software security vulnerabilities.The efficiency of manual research on security vulnerabilities is low and cannot meet the needs of cyberspace security.Therefore,how to apply artificial intelligence techniques such as machine learning and natural language processing to the study of security vulnerabilities has become a new hot spot.Artificial intelligence technology can intelligently process vulnerability information,which can assist in the research of security vulnerabilities and improve the efficiency of research on security vulnerabilities such as vulnerability mining.Firstly,the key technologies of automatic mining,automatic assessment,automatic exploitation and automatic repair of security vulnerabilities were analyzed,which pointed out that the automation of security vulnerability mining was the key of the application of artificial intelligence in the field of security vulnerability.Then,the latest research results of applying artificial intelligence technology to the research on security vulnerabilities was analyzed and summarized in recent years,which pointed out some problems in the application and gave corresponding solutions.Finally,the development trend of intelligent research on security vulnerabilities was prospected.…”
    Get full text
    Article
  17. 497

    Economic security of the enterprise: The essence, structure and mechanism of ensuring by Liubov Kovalska, Оleksandr Holii, Valentyn Holii

    Published 2023-03-01
    Subjects: “…economic security; enterprise; financial security; intellectual and personnel security; information security; technical and technological security; factors; methods…”
    Get full text
    Article
  18. 498
  19. 499
  20. 500