Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1021
Reduction algorithm based on supervised discriminant projection for network security data
Published 2021-06-01“…In response to the problem that for dimensionality reduction, traditional manifold learning algorithm did not consider the raw data category information, and the degree of clustering was generally at a low level, a manifold learning dimensionality reduction algorithm with supervised discriminant projection (SDP) was proposed to improve the dimensionality reduction effects of network security data.On the basis of the nearest neighbor matrix, the label information of the raw data category was exploited to construct a supervised discriminant matrix in order to translate unsupervised popular learning into supervised learning.The target was to find a low dimensional projective space with both maximum global divergence matrix and minimum local divergence matrix, ensuring that the same kind of data was concentrated and heterogeneous data was scattered after dimensionality reduction projection.The experimental results show that the SDP algorithm, compared with the traditional dimensionality reduction algorithms, can effectively remove redundant data with low time complexity.Meanwhile the data after dimensionality reduction is more concentrated, and the heterogeneous samples are more dispersed, suitable for the actual network security data analysis model.…”
Get full text
Article -
1022
Security Risks and Designs in the Connected Vehicle Ecosystem: In-Vehicle and Edge Platforms
Published 2025-01-01Subjects: Get full text
Article -
1023
RETRACTED: Influence parameters identification of resource potential components on food security
Published 2024-01-01Get full text
Article -
1024
VOLUNTEER MOVEMENT IN UKRAINE AS AN ELEMENT OF THE NATIONAL SECURITY SYSTEM: MODERNITY AND PROSPECTS
Published 2024-12-01Subjects: “…volunteer movement, national security of Ukraine, humanitarian aid, Armed Forces of Ukraine, social activism, national stability…”
Get full text
Article -
1025
Ranking food security indicators and metrics in Hawaiʻi: a Delphi approach
Published 2025-01-01Subjects: “…food security…”
Get full text
Article -
1026
Securing fog computing in healthcare with a zero-trust approach and blockchain
Published 2025-02-01Subjects: Get full text
Article -
1027
Extra-Legal Actions of the Security Council in Violation of Fundamental Human Rights
Published 2024-09-01Subjects: “…security council…”
Get full text
Article -
1028
Secure and Anonymous Source Routing Protocol for Wireless Ad Hoc Networks
Published 2009-01-01Get full text
Article -
1029
Joint beamforming optimization algorithm for secure cognitive radio based on STARS
Published 2024-03-01“…Secure cognitive radio (SCR) system based on reconfigurable intelligent surface (RIS) assumes that secondary user (SU) and primary user (PU) locate on the same side of the base station (BS), which can only cover part of the communication area and limits the deployment flexibility and effectiveness of the RIS.In order to solve the above problem, a new SCR system based on simultaneously transmitting and reflecting surface (STARS) was proposed.In the system, STARS could achieve full coverage of communication area, improve the received signal strength of the SU with the transmission beamforming vector and reduce the interference of the SU to the PU with the reflection beamforming vector, which provided new optimization degree of freedom (DoF) for the design of the SCR system.Considering secrecy rate constraint of the SU, interference power constraint (IPC) of the PU and transmission/reflection parameters constraint of the STARS, BS active beamforming vector and STARS transmission/reflection beamforming vectors were jointly optimized to minimize the BS’s transmit power from the perspective of reducing the total power consumption of the system.The minimization problem is a variable coupling non-convex problem, which is difficult to tackle directly.An alternating optimization (AO) algorithm based on difference-of-convex relaxation (DCR) method and sequential rank-one constraint relaxation (SROCR) method was proposed to jointly design the BS active beamforming vector and STARS transmission/reflection beamforming vectors.Simulation results show that the proposed algorithm has good convergence performance and effectively reduces the interference of SU on PU.Compared with the traditional RIS, random phase, maximum-ratio transmission (MRT) and equal energy splitting (Equal ES) schemes, the BS transmitting power is reduced by 8.3%, 15.4%, 5.9% and 5.3%, respectively.…”
Get full text
Article -
1030
Joint resource configuration method for secure fog computing Internet of things
Published 2023-07-01“…The current fog computing Internet of things (IoT) systems are prone to eavesdropping attacks in the process of physical communication transmission, and the existing research on fog computing has not effectively solved this problem.In order to realize the physical layer security (PLS) communication of the fog computing IoT to against the malicious eavesdropping of multiple eavesdroppers, a physical-layer secure fog computing Internet of things (PSFC-IoT) system was proposed.The secrecy rate of the proposed system in the secure communication scenario was analyzed, a joint resource management method based on the quantum bean optimization algorithm (QBOA) was proposed to solve the resource allocation problem of the network.The convergence performance of the proposed method was analyzed.Simulation results validate the efficiency of the proposed model and reveal the influence of various environmental parameters on system secrecy performance.In addition, the simulation results show that the proposed method can achieve the best secrecy performance for various communication scenarios.…”
Get full text
Article -
1031
Formal specification and security verification of usage control model based on PAT
Published 2016-03-01Subjects: Get full text
Article -
1032
Risk assessment and prevention in airport security assurance by integrating LSTM algorithm.
Published 2025-01-01“…It monitored the airport security situation in real-time based on the results and quickly notified airport security personnel to handle it. …”
Get full text
Article -
1033
Dynamic security-empowering architecture for space-ground integration information network
Published 2021-09-01Subjects: Get full text
Article -
1034
Hunger Solution: One-Dimensional and Multi-Dimensional Food Security Programs
Published 2018-12-01Subjects: Get full text
Article -
1035
The role of digital health in pandemic preparedness and response: securing global health?
Published 2024-12-01“…Background Digital health technologies, such as mobile applications, wearable devices, and electronic health record systems, have significantly enhanced global health security by enabling timely data collection and analysis, identifying infectious disease trends, and reducing infection risk through remote services. …”
Get full text
Article -
1036
Cities of Contagion: Pandemic Precarity, Migration, and Food Security in Urban Africa
Published 2025-01-01Get full text
Article -
1037
Opportunistic secure transmission scheme for simultaneous wireless information and power transfer
Published 2019-02-01Subjects: Get full text
Article -
1038
Analysis model of binary code security flaws based on structure characteristics
Published 2017-09-01Subjects: Get full text
Article -
1039
Role of Global Food Security in the Common Agrarian Policy of the European Union
Published 2014-04-01Subjects: “…global food security…”
Get full text
Article -
1040
Research on the security of national secret algorithm based compute first networking
Published 2023-08-01“…With the promotion of national secret algorithm, in-depth research on the arithmetic network was carried out, a more efficient and reasonable security scheme for the arithmetic network was proposed, ensuring the data security and privacy of the arithmetic network with the help of the state secret algorithm.The main elements of the design program included: Supporting arithmetic demand and cryptographic invocation through the underlying resources, the arithmetic orchestration layer provided the ability to orchestrate data arithmetic, meanwhile, the arithmetic scheduling layer intelligently discerned the optimal nodes for arithmetic resource scheduling and allocation; the cryptographic reinforcement layer used the national secret algorithm based on hardware support with the help of public key cryptosystem, hash function, digital envelope, homomorphic encryption, blockchain and other technologies.Focusing on arithmetic network access security, transmission security, data security and privacy protection aspects of security implementation.An architecture and application form was innovatively proposed to guarantee the data security of the arithmetic network, which could meet the needs of the application layer arithmetic in the scenarios of big data, intelligent technology, etc..The security of the arithmetic network is enhanced by empowering the arithmetic network through the state-secret algorithm.…”
Get full text
Article