Showing 701 - 720 results of 836 for search '(( Computer networks Security features. ) OR ( Computer network Security features. ))*', query time: 0.21s Refine Results
  1. 701
  2. 702
  3. 703
  4. 704
  5. 705
  6. 706
  7. 707

    Technical, forensic and organisational aspects of work with Monero cryptocurrency by V. V. Nosov, O. V. Manzhai, V. O. Kovtun

    Published 2023-09-01
    “…The features of forensic investigation of computer equipment used to work with Monero are revealed. …”
    Get full text
    Article
  8. 708
  9. 709
  10. 710
  11. 711
  12. 712
  13. 713
  14. 714

    Application of Blockchain and Internet of Things in Healthcare and Medical Sector: Applications, Challenges, and Future Perspectives by Pranav Ratta, Amanpreet Kaur, Sparsh Sharma, Mohammad Shabaz, Gaurav Dhiman

    Published 2021-01-01
    “…Few major reasons for using the Blockchain in healthcare systems are its prominent features, i.e., Decentralization, Immutability, Security and Privacy, and Transparency. …”
    Get full text
    Article
  15. 715

    User authentication of industrial internet based on HHT transform of mouse behavior by Yigong ZHANG, Qian YI, Jian LI, Congbo LI, Aijun YIN, Shuping YI

    Published 2022-06-01
    “…The rapid development of the industrial internet had caused widespread concern about the network security, and the end-user authentication technology was considered a research hotspot.According to the characteristics of human-computer interaction in industrial internet, an experimental website was designed.24 users' mouse behavior data in an uncontrolled environment were collected within 2.5 years to conduct case studies.Hilbert-Huang transform (HHT) was used to extract frequency domain features of mouse behavior signals, combined with time domain features to form a time-frequency joint domain feature matrix of 163-dimensional to characterize user mouse behavior patterns.Bagged tree, support vector machine (SVM), Boost tree and K-nearest neighbor (KNN) were used to build a user authentication model, and the comparison result showed that the Bagged tree had the best internal detection effect in this case, with an average false acceptance rate (FAR) of 0.12% and an average false rejection rate (FRR) of 0.28%.In external detection, the FAR was 1.47%.Compared with the traditional mouse dynamics method, the frequency domain information of mouse behavior extracted by HHT can better realize the user authentication, and provide technical support the security of the industrial internet.…”
    Get full text
    Article
  16. 716
  17. 717
  18. 718
  19. 719
  20. 720