Showing 521 - 540 results of 9,720 for search '"security"', query time: 0.09s Refine Results
  1. 521
  2. 522
  3. 523
  4. 524
  5. 525
  6. 526
  7. 527

    Characteristics of security risks of large industrial investments and their management principles by Frigyes Gubics

    Published 2025-01-01
    Subjects: “…Industrial investment, risk assessment, asset security, data protection…”
    Get full text
    Article
  8. 528
  9. 529
  10. 530

    Implementasi Mekanisme End-To-End Security pada IoT Middleware by Eko Sakti Pramukantoro, Fariz Andri Bakhtiar, Ahmad Lutfi Bayu Aji, Deny Hari Prasetya Dewa

    Published 2019-05-01
    “…The results show both mechanisms can securely communication between middleware and other parties, but AES-CBS can only secure data payload, not entire data. …”
    Get full text
    Article
  11. 531
  12. 532

    Research on backup and remapping of network slice based on security classification by Zhiyong SUN, Xinsheng JI, Wei YOU, Quan YUAN

    Published 2018-11-01
    “…In the future virtual environment of 5G core network,the general X86 servers make the attackers exploit vulnerabilities more easily,the substrate network is infected with and spreads the virus more easily,and the problem of single physical node failed will affect the service performance of the network slice seriously.Based on the existing node backup and remapping solutions,considering the impact of security constraints among nodes on network security performance,a security parameter evaluation model of virtual nodes and physical nodes were proposed in the network slicing,and the security constraint relationship was established between the virtual nodes and the physical nodes.Then backup virtual nodes were selected based on the security parameters evaluation model,and backup mapping methods were designed.Finally,the node remapping mechanism was designed with satisfying the requirement of network delay.Experiments show that the proposed method can significantly improve network intrusion tolerance with satisfying the requirements of network slicing service performance.…”
    Get full text
    Article
  13. 533
  14. 534
  15. 535

    Smart contract-based secure cooperative spectrum sensing algorithm by Chu Ji, Qi Zhu

    Published 2021-12-01
    “…With simulations, we prove that the algorithm proposed in this article increases the accuracy and security of spectrum sensing and can effectively resist SSDF attack.…”
    Get full text
    Article
  16. 536

    A security authentication scheme in RFID system for smart park by Rongrong LI, Jiantao KOU, Gang DONG, Liangrui TANG

    Published 2016-02-01
    “…The new protocol could effectively resist attacks of re-transmission,tracking,deception,cloning and de-synchronizationand,and it had high security and practicability.…”
    Get full text
    Article
  17. 537

    QUALITATIVE CHANGES IN JAPAN’S POLICY IN THE FIELD OF MILITARY SECURITY IN 2013 by D. V. Streltsov

    Published 2013-10-01
    “…The article deals with the qualitative changes that have taken place in the course of Japan in the field of military security in December 2012 after the rise of the second Abe Cabinet. …”
    Get full text
    Article
  18. 538

    Indoor Vertical Farming Systems for Food Security and Resource Sustainability by Jiangxiao Qiu, Haimanote K. Bayabil, Yuncong Li

    Published 2020-04-01
    “…Learn about the limitations and challenges of the industry as well as the potential benefits both for food security and resource sustainability. https://edis.ifas.ufl.edu/fr429 …”
    Get full text
    Article
  19. 539
  20. 540

    Dual-verified secure localization method for unmanned intelligent vehicles by GU Xiaodan, XIA Guozheng, SONG Bingchen, YANG Ming, LUO Junzhou

    Published 2024-06-01
    “…To address this problem, a dual-verified secure localization method for unmanned intelligent vehicles was proposed. …”
    Get full text
    Article