Showing 561 - 580 results of 9,720 for search '"security"', query time: 0.07s Refine Results
  1. 561
  2. 562

    Application of edge computing technology in smart grid data security by Zhuo Cheng, Jiangxin Li, Jianjun Zhang, Chen Wang, Hui Wang, Juyin Wu

    Published 2025-02-01
    “…Absrtact: In order to solve the problem that the two-way flow of power and information between user nodes and service nodes in the smart grid poses a huge threat to the privacy and security of user data, and at the same time, the limitation of the power bureau's computing resources also brings users response delay, service quality degradation and other problems, the author proposes the application of edge computing technology in smart grid data security. …”
    Get full text
    Article
  3. 563

    Review on security risks of key components in industrial control system by Shijie TANG, Fang YUAN, Jun LI, Yong DING, Huiyong WANG

    Published 2022-06-01
    “…With the rapid development of modern information technology and communication technology, industrial control system has become an important part of national key infrastructure, whose security is related to national strategic security and social stability.The close connection between modern industrial control system and Internet promotes the rapid progress of industrial control technology, meanwhile it brings serious security risks.Since the“Stuxnet” virus incident, attacks on industrial control systems have occurred frequently, which causes huge economic losses to global production enterprises.Besides, it also poses significant impact on the social stability and security to many countries and regions, which has aroused people’s great concern about the security of industrial control systems.Due to the wide variety of automation equipment and proprietary protocols, complex data flow and rapid development in modern industrial control system, it is very difficult to summarize the safety of key components of industrial control.There are few literatures related to this area, and most of them are old and incomplete.To solve the above problems, the mainstream architecture and related components of the current industrial control system were introduced.Then the security vulnerabilities and potential threats in the key industrial control components were analyzed.The attack methods of SCADA control center, programmable logic controller and field equipment were summarized.Furthermore, the preconditions, objects, steps and hazards of the attack in the literature in recent years were also analyzed.The attacks against industrial control network were classified from the perspective of integrity and confidentiality.Finally, the possible development trend of industrial control system attack was given.…”
    Get full text
    Article
  4. 564

    A hierarchy model on the research fields of cyberspace security technology by Bin-xing FANG

    Published 2015-12-01
    Subjects: “…cyberspace security…”
    Get full text
    Article
  5. 565
  6. 566

    Energy-Efficient Secure Path Algorithm for Wireless Sensor Networks by Imanishimwe Jean de Dieu, Nyirabahizi Assouma, Maniraguha Muhamad, Wang Jin, Sungyoung Lee

    Published 2012-04-01
    “…To prolong the network lifetime, sensor nodes need a secure load-balancing route. In this paper, we investigate the facts of ensuring secure sensed data in a balanced energy network backbone, and propose energy-efficient secure path algorithm (ESPA) for WSNs. …”
    Get full text
    Article
  7. 567

    Performance analysis of physical layer security based on channel correlation by Xuanli WU, Zhicong XU, Yuchen WANG, Yong LI

    Published 2021-03-01
    “…In view of the correlation of the main and eavesdropper’s channels in physical layer security, the impact of channel correlation on the secrecy performance was studied, the exact form ulations of ergodic secrecy capacity and secrecy outage probability were derived, and then the asymptotic formulations in the scenarios where the channel states were large and small were given.The theoretical analysis were verified by the numerical simulations.The simulation results show that channel correlation will cause the loss of ergodic secrecy capacity, however, it does not mean the outage probability of communication will increase with high channel correlation.Actually, when the outage rate is set reasonably, the impact of channel correlation is related to the average signal-to-noise ratio (SNR) at the receiver end.At high SNR range, high correlation will decrease the outage probability, at low SNR range, high correlation will increase the outage probability, and at medium SNR range, the correlation will not affect the outage probability significantly.Based on the above conclusion, the parameters can be set according to SNR and correlation, so that the secrecy performance can be maintained.…”
    Get full text
    Article
  8. 568

    A Secure Image Transmission Scheme Based on Improved DCSK by Lifang He, Gang Zhang, Tianqi Zhang

    Published 2013-06-01
    “…However, it is lack of performance in security, and easier to be cracked. A modified DCSK scheme was proposed for the security problems caused by the traditional DCSK scheme. …”
    Get full text
    Article
  9. 569

    Blockchain-Based Secure Traceable Scheme for Food Supply Chain by S. Thangamayan, Kalyani Pradhan, Ganesh Babu Loganathan, S. Sitender, S. Sivamani, Mulugeta Tesema

    Published 2023-01-01
    “…The typical food traceability system’s data layer is made up of relational databases managed by core businesses, which cannot ensure data security. It is inefficient and requires a lot of upkeep. …”
    Get full text
    Article
  10. 570
  11. 571
  12. 572

    Climate change and agricultural productivity: Economic implications for food security by Riza Murabildayeva, Laila Bimendiyeva, Saltanat Kondybayeva, Zhanna Yermekova

    Published 2024-12-01
    “…Consequently, it is crucial to assess how the negative effects of climate change can be mitigated to ensure food security. This study evaluated the relationship between agriculture, food security, and CO2 emissions. …”
    Get full text
    Article
  13. 573
  14. 574
  15. 575

    China’s cultivated land threshold from the perspective of food security by ZHAO Xiaoyu, SUN Chunqiang, CUI Rongguo, CHEN Jing, ZHANG Xiaoyu, CAO Tingyu, LI Chao

    Published 2024-12-01
    Subjects: “…cultivated land protection|food security|healthy china|cultivated land threshold|per capita grain demand…”
    Get full text
    Article
  16. 576
  17. 577
  18. 578
  19. 579

    Women’s Role in Violence and UN Women, Peace, and Security Agenda by Çağlayan Başer

    Published 2024-02-01
    Subjects: “…the women peace and security agenda…”
    Get full text
    Article
  20. 580