Showing 601 - 620 results of 9,720 for search '"security"', query time: 0.05s Refine Results
  1. 601
  2. 602
  3. 603

    UC secure one-time signature based broadcast authentication by ZHANG Jun-wei, MA Jian-feng, YANG Li

    Published 2010-01-01
    Subjects: “…network security…”
    Get full text
    Article
  4. 604

    Application of convolutional neural networks in the intelligence security system subsystem by V. S. Demeshko, A. I. Фёдоров

    Published 2020-08-01
    “…The article proposes the structure of an integrated security system for areal facilities. The main subsystems included in its composition are considered. …”
    Get full text
    Article
  5. 605

    Small Arms and Small Countries: Firearms and the International Security Agenda by Carla Álvarez Velasco

    Published 2016-05-01
    “…This article examines the emergence of the small arms trade on the international political agenda as a growing security threat. Employing the theoretical framework proposed by the Copenhagen School, this article argues that the issue of small arms gained traction at the international level in the context of the post-Cold War. …”
    Get full text
    Article
  6. 606

    Container Security Device Chain Network for Safe Railway Transportation by Sungryul Kim, Jeonghyun Kim, Younghwan Yoo

    Published 2014-11-01
    “…This paper suggests the use of the container security devices (CSDs), which has been adopted for the marine transportation so far, to enhance the security of railway freight transportation. …”
    Get full text
    Article
  7. 607
  8. 608
  9. 609

    Embedded software security testing technology for relay protection devices by Wei DING, Jiaxiao MENG, Tao DAI, Huajun CHEN

    Published 2018-04-01
    “…As the first defensive line of power grid security,the right actions of delay protection devices can minimize the influence to the electric power system security caused by system or equipment failures.Based on the research of relay protection device inspection procedures and enterprise standard of electric power industry,the embedded software testing content and technologies of relay protection device were studied,including functional testing,performance testing and fault injection testing.This research contributes to the completeness and correctness of the embedded software testing about relay protection device.…”
    Get full text
    Article
  10. 610
  11. 611
  12. 612
  13. 613
  14. 614
  15. 615
  16. 616

    Security mechanism in access control based on non-cooperative game by Yi-xuan ZHANG, Jing-sha HE, Bin ZHAO

    Published 2014-11-01
    “…Access control technology is an important information security technology to protect the sensitive information and critical resources in computer system and network.But traditional access control methods could only respond to access requests of users passively and can’t meet the changing dynamic network environment.In order to improve the ability to respond to malicious attacks and threats in access control system,a security mechanism is designed,which is suitable for access control,based on non-cooperative game theory in the game.When the subject makes an access request to the object,there will be a non-cooperative game between them to get Nash equilibrium.Then the security mechanism will compare the probabilities in the Nash equilibrium to the setting thresholds to get the conclusion that whether to authorize the subject or not.Experiment proves the effectiveness of the security mechanisms.…”
    Get full text
    Article
  17. 617
  18. 618
  19. 619
  20. 620

    Cooperative secure transmission against collusive eavesdroppers in Internet of Things by Xin Fan, Yan Huo

    Published 2020-06-01
    “…As Internet of Things (IoT) has boomed in recent years, many security issues have also been exposed. Focusing on physical layer security in wireless Internet of Things network communication, a series of security methods have been widely studied. …”
    Get full text
    Article