Showing 901 - 920 results of 9,720 for search '"security"', query time: 0.07s Refine Results
  1. 901
  2. 902

    Secure Pesticide Storage: Using and Managing a Pesticide Storage Facility by Thomas W. Dean

    Published 2004-10-01
    “…Revised: November 2004.  PI33/PI068: Secure Pesticide Storage: General Features (ufl.edu) …”
    Get full text
    Article
  3. 903
  4. 904

    A certificateless aggregate signature scheme for security and privacy protection in VANET by Eko Fajar Cahyadi, Tzu-Wei Su, Chou-Chen Yang, Min-Shiang Hwang

    Published 2022-05-01
    “…Unfortunately, some of them still have some security and privacy issues under specific existing attacks. …”
    Get full text
    Article
  5. 905

    Inter-domain routing security mechanism for crossing autonomous system alliance by Ling-jing KONG, Hua-xin ZENG, Jun DOU, Yao LI

    Published 2014-10-01
    “…Through studying and analyzing SE-BGP (security enhanced BGP),it was found that it couldn’t validate the cross-alliance AS (autonomous system) and defense the self-launched active attack.To solve the security problems,two-layer cross-alliance hierarchical structure CAHS (cross-alliance hierarchical structure) was designed.Based on CAHS,using the idea of passport visa and the features of AdHASH (additive hash),a cross-alliance BGP security mechanism SCA-BGP (secure crossing alliance for BGP) was proposed.The mechanism has higher security,which is able to effectively validate the identities and behavior authorization of the cross-alliance AS as well as the message carried by them.The experiment results show that SCA-BGP can effectively reduce the certificate scale and extra time overhead to get better scalability and convergence performance.…”
    Get full text
    Article
  6. 906

    Methodology for determining actual threats to information security in medical information system by V. A. Maystrenko, O. A. Bezrodnykh, R. A. Dorokhin

    Published 2021-11-01
    “…Its use also makes it possible to assess the relevance of information security threats for MIS that do not have qualified specialists in the field of information security in the staff of a medical institution, which is relevant for a large number of medical institutions. …”
    Get full text
    Article
  7. 907

    Low-Cost and Secure Communication System for SCADA System of Remote Microgrids by Amjad Iqbal, M. Tariq Iqbal

    Published 2019-01-01
    “…Renewable energy-based local microgrids are gaining popularity despite the unavailability of low-cost, power efficient, and secure communication system for its supervisory control and data acquisition (SCADA) system. …”
    Get full text
    Article
  8. 908
  9. 909
  10. 910
  11. 911
  12. 912

    A Novel Computer Virus Propagation Model under Security Classification by Qingyi Zhu, Chen Cen

    Published 2017-01-01
    “…In reality, some computers have specific security classification. For the sake of safety and cost, the security level of computers will be upgraded with increasing of threats in networks. …”
    Get full text
    Article
  13. 913
  14. 914

    Factors of geography and security in the integration construction: the case of East- Asian integration by A. A. Baykov

    Published 2012-12-01
    “…The paper analyzes the impact of geography and security threats on the dynamics and forms of integration cooperation in the area of East Asia. …”
    Get full text
    Article
  15. 915

    Secure Pesticide Storage: Workspace Features of a Pesticide Storage Facility by Thomas W. Dean

    Published 2004-10-01
    “… This document identifies and discusses three key features of a pesticide storage facility's interior that, in combination, promote both worker safety and pesticide container security. This document is Fact Sheet PI-31, part of a series from the Pesticide Information Office, Food Science and Human Nutrition Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
    Get full text
    Article
  16. 916

    Security analysis of weighted network anonymity based on singular value decomposition by Yong ZENG, Lingjie ZHOU, Zhongyuan JIANG, Zhihong LIU, Jianfeng MA

    Published 2018-05-01
    “…The security of anonymous method based on singular value decomposition (SVD) in the privacy preserving of weighted social network was analyzed.The reconstruction method in network with integer weights and the inexact reconstruction method in network with arbitrary weighted were proposed.The <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mi>ε</mi> <mi>N</mi> </mfrac> </math></inline-formula> -tolerance was definited to measure its safety.It was also pointed out that the upper bound of ε (the reconfigurable coefficient) obtained in current spectral theories was so conservative that lacks of guidance.The reconfigurable coefficients of random networks,Barabasi-Albert networks,small world networks and real networks were calculated by experiment.Moreover,the reconfigurable coefficients of double perturbation strategies based on SVD were also tested.Experimental results show that weighted social networks have different tolerances on spectrum loss,and there is a close relationship between its tolerance and network parameters.…”
    Get full text
    Article
  17. 917
  18. 918
  19. 919
  20. 920