Showing 1,061 - 1,080 results of 9,720 for search '"security"', query time: 0.08s Refine Results
  1. 1061

    Secure UAV-Based System to Detect Small Boats Using Neural Networks by Moisés Lodeiro-Santiago, Pino Caballero-Gil, Ricardo Aguasca-Colomo, Cándido Caballero-Gil

    Published 2019-01-01
    “…Given the high sensitivity of the managed information, the proposed system includes cryptographic protocols to protect the security of communications.…”
    Get full text
    Article
  2. 1062

    Research on consistency protection mechanism for secure states of virtual domain in cloud environment by Wei-qi DAI, De-qing ZOU, Hai JIN, Yan XIA

    Published 2016-10-01
    “…The traditional trusted computing architecture was suffering from the cloud uncertainty and dynamics caused by VM rollback or migration,which was a fatal threat to the cloud security.following investigations were conducted.Secure cloud virtual domain basic architecture; Time state consistence and collection mechanism.Cyber state consistence and collection mechanism.This study guaranteed security state consistence of virtual domain and improved the security and efficiency of the online service platform for both government institutions and companies.…”
    Get full text
    Article
  3. 1063
  4. 1064
  5. 1065

    New kind of CD-DCSK chaos shift keying secure communication system by Yong ZHU, Jia-nan WANG, Qun DING

    Published 2012-05-01
    “…As existing chaos keying communication systems had the issues of low data transmission rate and weak system confidentiality,a new kind of chaos shift keying communication system:CD-DCSK(correlation delay-differential chaos shift keying) was presented.At the same time lucubrated and simulated the communication performances of this new system.The theoretical deduction and emulational experimentation analysis verified that CD-DCSK has both merits of high confidentiality of CDSK and low BER of DCSK,and its transmission rate is twice as much as original shift keying schemes.Meanwhile,this new communication scheme perfectly achieved the secrecy transmission of age signal.Therefore,it can be clearly seen that this new system is realizable and has high security.…”
    Get full text
    Article
  6. 1066
  7. 1067

    Advanced Approach to Information Security Management System Model for Industrial Control System by Sanghyun Park, Kyungho Lee

    Published 2014-01-01
    “…Therefore, a new information security management system based on confidentiality, integrity, and availability as well as safety is required for ICSs. …”
    Get full text
    Article
  8. 1068
  9. 1069
  10. 1070
  11. 1071

    Legal Regulation of Interaction of Security Service of Ukraine with Civil Society in Counteracting Terrorism by A. Yu. Helzhynskyi

    Published 2019-09-01
    “…The comparative legal method of the study analyzes the source base of national law concerning the interaction of the Security Service of Ukraine with civil society in fighting against terrorism. …”
    Get full text
    Article
  12. 1072

    THE SECURITY ASPECT OF TURKEY-UNITED STATES RELATIONS: IN SEARCH FOR A NEW MODEL by I. A. Svistunova

    Published 2016-04-01
    “…Security cooperation has always been an important aspect of the relations between Turkey and the USA. …”
    Get full text
    Article
  13. 1073
  14. 1074

    Aukus (Australia-united kingdom-united states) threat to Indo-pacific security by Ismiyatun Ismiyatun, Ita Puji Lestari

    Published 2024-11-01
    “…Countries can change their defense budgets based on their assessment of security threats in the region and changes in the balance of power. …”
    Get full text
    Article
  15. 1075
  16. 1076
  17. 1077

    Secure-Network-Coding-Based File Sharing via Device-to-Device Communication by Lei Wang, Qing Wang

    Published 2017-01-01
    “…In order to increase the efficiency and security of file sharing in the next-generation networks, this paper proposes a large scale file sharing scheme based on secure network coding via device-to-device (D2D) communication. …”
    Get full text
    Article
  18. 1078

    Exploiting Dual-Output Programmable Blocks to Balance Secure Dual-Rail Logics by Laurent Sauvage, Maxime Nassar, Sylvain Guilley, Florent Flament, Jean-Luc Danger, Yves Mathieu

    Published 2010-01-01
    “…However, assessing the security level which can be achieved with them is an important issue, as it is directly related to the suitability to use commercial FPGA instead of proprietary custom FPGA for this kind of protection. …”
    Get full text
    Article
  19. 1079
  20. 1080

    Successive relaying secure transmission scheme based on inter-relay interference cancellation by Yi ZOU, Kai-zhi HUANG, Xiao-lei KANG

    Published 2017-09-01
    “…A secure scheme based on inter-relay interference cancellation was proposed to solve untrusted relay eavesdropping problem in successive relaying systems.First inter-relay interference between trusted relay and untrusted relay was exploited as artificial noise to degrade untrusted relay’s eavesdropping condition,then interference iterative cancellation was adapted to improve signal quality at legitimate user by making use of correlation between signals in time domain.Based on this,a quick power allocation algorithm aiming to minimize untrusted relay’s sum rate was proposed.Analysis and simulation results show that the proposed scheme suppress untrusted relay’s eavesdropping without loss of communication efficiency,a promotion of at least 2 bit·s<sup>-1</sup>·Hz<sup>-1</sup>in secrecy rate can be observed.…”
    Get full text
    Article