Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
561
Power PTN security comprehensive evaluation based on power application
Published 2015-12-01Subjects: Get full text
Article -
562
Application of edge computing technology in smart grid data security
Published 2025-02-01“…Absrtact: In order to solve the problem that the two-way flow of power and information between user nodes and service nodes in the smart grid poses a huge threat to the privacy and security of user data, and at the same time, the limitation of the power bureau's computing resources also brings users response delay, service quality degradation and other problems, the author proposes the application of edge computing technology in smart grid data security. …”
Get full text
Article -
563
Review on security risks of key components in industrial control system
Published 2022-06-01“…With the rapid development of modern information technology and communication technology, industrial control system has become an important part of national key infrastructure, whose security is related to national strategic security and social stability.The close connection between modern industrial control system and Internet promotes the rapid progress of industrial control technology, meanwhile it brings serious security risks.Since the“Stuxnet” virus incident, attacks on industrial control systems have occurred frequently, which causes huge economic losses to global production enterprises.Besides, it also poses significant impact on the social stability and security to many countries and regions, which has aroused people’s great concern about the security of industrial control systems.Due to the wide variety of automation equipment and proprietary protocols, complex data flow and rapid development in modern industrial control system, it is very difficult to summarize the safety of key components of industrial control.There are few literatures related to this area, and most of them are old and incomplete.To solve the above problems, the mainstream architecture and related components of the current industrial control system were introduced.Then the security vulnerabilities and potential threats in the key industrial control components were analyzed.The attack methods of SCADA control center, programmable logic controller and field equipment were summarized.Furthermore, the preconditions, objects, steps and hazards of the attack in the literature in recent years were also analyzed.The attacks against industrial control network were classified from the perspective of integrity and confidentiality.Finally, the possible development trend of industrial control system attack was given.…”
Get full text
Article -
564
A hierarchy model on the research fields of cyberspace security technology
Published 2015-12-01Subjects: “…cyberspace security…”
Get full text
Article -
565
Design and implementation ofserver security alarm system in campus network
Published 2014-10-01Subjects: Get full text
Article -
566
Energy-Efficient Secure Path Algorithm for Wireless Sensor Networks
Published 2012-04-01“…To prolong the network lifetime, sensor nodes need a secure load-balancing route. In this paper, we investigate the facts of ensuring secure sensed data in a balanced energy network backbone, and propose energy-efficient secure path algorithm (ESPA) for WSNs. …”
Get full text
Article -
567
Performance analysis of physical layer security based on channel correlation
Published 2021-03-01“…In view of the correlation of the main and eavesdropper’s channels in physical layer security, the impact of channel correlation on the secrecy performance was studied, the exact form ulations of ergodic secrecy capacity and secrecy outage probability were derived, and then the asymptotic formulations in the scenarios where the channel states were large and small were given.The theoretical analysis were verified by the numerical simulations.The simulation results show that channel correlation will cause the loss of ergodic secrecy capacity, however, it does not mean the outage probability of communication will increase with high channel correlation.Actually, when the outage rate is set reasonably, the impact of channel correlation is related to the average signal-to-noise ratio (SNR) at the receiver end.At high SNR range, high correlation will decrease the outage probability, at low SNR range, high correlation will increase the outage probability, and at medium SNR range, the correlation will not affect the outage probability significantly.Based on the above conclusion, the parameters can be set according to SNR and correlation, so that the secrecy performance can be maintained.…”
Get full text
Article -
568
A Secure Image Transmission Scheme Based on Improved DCSK
Published 2013-06-01“…However, it is lack of performance in security, and easier to be cracked. A modified DCSK scheme was proposed for the security problems caused by the traditional DCSK scheme. …”
Get full text
Article -
569
Blockchain-Based Secure Traceable Scheme for Food Supply Chain
Published 2023-01-01“…The typical food traceability system’s data layer is made up of relational databases managed by core businesses, which cannot ensure data security. It is inefficient and requires a lot of upkeep. …”
Get full text
Article -
570
Physical layer security performance of MF relay selection systems
Published 2021-09-01Subjects: Get full text
Article -
571
A neutrosophic framework for evaluating security measures in information systems
Published 2024-11-01Subjects: Get full text
Article -
572
Climate change and agricultural productivity: Economic implications for food security
Published 2024-12-01“…Consequently, it is crucial to assess how the negative effects of climate change can be mitigated to ensure food security. This study evaluated the relationship between agriculture, food security, and CO2 emissions. …”
Get full text
Article -
573
Research and practice on power big data security governance system
Published 2019-11-01Subjects: Get full text
Article -
574
The Criminological Roles and Effects on Peace, Safety and Security in South Africa
Published 2024-12-01Subjects: Get full text
Article -
575
China’s cultivated land threshold from the perspective of food security
Published 2024-12-01Subjects: “…cultivated land protection|food security|healthy china|cultivated land threshold|per capita grain demand…”
Get full text
Article -
576
Destabilization of Regional Labour Markets in Ukraineunder Heightened Security Threats
Published 2024-12-01Get full text
Article -
577
Regional and Global dimensions in the complex of problems of security in Southern Caucasus
Published 2011-06-01Get full text
Article -
578
Secure Transmission Based on Antenna Selection for Network Coding System
Published 2015-02-01Subjects: Get full text
Article -
579
Women’s Role in Violence and UN Women, Peace, and Security Agenda
Published 2024-02-01Subjects: “…the women peace and security agenda…”
Get full text
Article -
580
The Urgency of Job Loss Security Program for the Protection of Human Rights
Published 2024-09-01Subjects: “…job loss security program…”
Get full text
Article