Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
481
Theoretical and Practical Fundamentals for Armenia’s National Security Strategy
Published 2013-02-01Subjects: “…the national security strategy…”
Get full text
Article -
482
SSMCI:verification mechanism for security protocols centered on the attacker
Published 2017-10-01Subjects: “…security protocol…”
Get full text
Article -
483
Analysis of security extension protocol in e-mail system
Published 2020-12-01Subjects: Get full text
Article -
484
Adaptively secure attribute-based encryption for traitor tracing
Published 2016-01-01Subjects: Get full text
Article -
485
CONCEPTUAL MODELLING AND ORGANIZATION OF SECURITY MECHANISMS IN DISTRIBUTED SYSTEMS
Published 2016-10-01“…We analyze the existing DS from the point of security and construct a two-level hierarchy of models. …”
Get full text
Article -
486
Security model without managers for blockchain trading system
Published 2020-12-01Subjects: Get full text
Article -
487
6G endogenous security:architecture and key technologies
Published 2020-01-01Subjects: Get full text
Article -
488
Security technologies in 4G network for power grid
Published 2015-12-01Subjects: Get full text
Article -
489
Spatial changes management in order to ensure economic security
Published 2020-04-01Subjects: “…economic security…”
Get full text
Article -
490
Analysis of provably secure on-demand source routing in MANET
Published 2009-01-01Subjects: Get full text
Article -
491
Code security of mobile backup modules on the Android platform
Published 2017-01-01Subjects: Get full text
Article -
492
Research of Mobile Internet Core Security Requirement and Protection
Published 2013-11-01Subjects: Get full text
Article -
493
Efficient identification protocol provably secure in standard model
Published 2009-01-01“…The new identification protocol is proven secure against impersonation under concurrent reset attack setting in standard model. …”
Get full text
Article -
494
Research on Satellite Internet Security Simulation Test Technology
Published 2023-06-01Subjects: Get full text
Article -
495
SSDHT:social network-based secure DHT mechanism
Published 2018-11-01“…P2P systems have been widely used in the field of file sharing,etc.However,DHT (distributed hash table) networks have no center,no authentication,and lack of node authentication mechanism,making existing DHT-based P2P systems vulnerable to external attacks such as Sybil attacks.A DHT security enhancement mechanism based on social network was proposed,which introduced the trust relationship of nodes in the social network into the DHT network to improve the recognition ability of Sybil nodes.The KAD (Kademlia) algorithm was used as an example to verify the experiment.Experimental results based on Facebook and Twitter datasets show that the proposed security mechanism is suitable for large-scale dynamic networks and can effectively defend against Sybil attacks.…”
Get full text
Article -
496
Application of artificial intelligence technology in the field of security vulnerability
Published 2018-08-01“…The large number of software and the enhancement of complexity have brought severe challenges to the research of software security vulnerabilities.The efficiency of manual research on security vulnerabilities is low and cannot meet the needs of cyberspace security.Therefore,how to apply artificial intelligence techniques such as machine learning and natural language processing to the study of security vulnerabilities has become a new hot spot.Artificial intelligence technology can intelligently process vulnerability information,which can assist in the research of security vulnerabilities and improve the efficiency of research on security vulnerabilities such as vulnerability mining.Firstly,the key technologies of automatic mining,automatic assessment,automatic exploitation and automatic repair of security vulnerabilities were analyzed,which pointed out that the automation of security vulnerability mining was the key of the application of artificial intelligence in the field of security vulnerability.Then,the latest research results of applying artificial intelligence technology to the research on security vulnerabilities was analyzed and summarized in recent years,which pointed out some problems in the application and gave corresponding solutions.Finally,the development trend of intelligent research on security vulnerabilities was prospected.…”
Get full text
Article -
497
Economic security of the enterprise: The essence, structure and mechanism of ensuring
Published 2023-03-01Subjects: “…economic security; enterprise; financial security; intellectual and personnel security; information security; technical and technological security; factors; methods…”
Get full text
Article -
498
Cyber security laws and safety in e-commerce in India
Published 2023-06-01Subjects: Get full text
Article -
499
Reconstruction of BLP model based on secure subject access
Published 2007-01-01Subjects: Get full text
Article -
500
Suggestion on establishing curriculum system for information security major
Published 2016-07-01Subjects: “…information security…”
Get full text
Article