Showing 1,301 - 1,320 results of 9,720 for search '"security"', query time: 0.08s Refine Results
  1. 1301
  2. 1302

    Information acquisition strategy for security gate-ways based on swing door trending algorithm by Shuang WANG, Yueming LU

    Published 2018-10-01
    “…Acquisition the control information of security gateway is an important security awareness method in the space and earth integrated network,but the traditional equal interval time data method acquisition has problems,such as waste of network bandwidth,a large amount of data redundancy,excessive data collection of acquisition node and excessive transmission times.In order to solve these problems,a data acquisition strategy based on improved swing door trending algorithm was proposed,which analyzed and improved swing door trending algorithm to determine the control information of security gateway such as the rangeability of gateway traffic and CPU utilization,and to adjust the data acquisition interval adaptively.The experimental results show that compared with the traditional equal interval time data method acquisition,under the condition of ensuring the data accuracy,the proposed strategy can lower the times of data acquisition and transmission,effectively reduce network overhead and improve data acquisition efficiency.…”
    Get full text
    Article
  3. 1303

    Introducing maximum sustainable yield targets in fisheries could enhance global food security by Christian Elleby, Ignacio Pérez Domínguez, Rasmus Nielsen, Max Nielsen, Ayoe Hoff

    Published 2025-01-01
    “…Abstract Aquatic foods are crucial for global food and nutrition security, but overfishing has led to depleted fish stocks, threatening both food security and the environment. …”
    Get full text
    Article
  4. 1304
  5. 1305
  6. 1306
  7. 1307
  8. 1308
  9. 1309
  10. 1310

    Statistical Characteristics and Security Analysis over Multi-Cascade κ-μ Shadowed Channels by Xiaohong Wang, Ming Ren, Yiwei Fang, Xinji Tian, Yanyang Zeng

    Published 2022-01-01
    “…Moreover, we further utilize the two performance evaluation metrics including outage probability and intercept probability to investigate the impacts of cascade number and channel parameters on reliability and security. Finally, the theoretical results are consistent with the simulations, proving the correctness of the derivation. …”
    Get full text
    Article
  11. 1311
  12. 1312
  13. 1313
  14. 1314

    Delay-Tolerant, Low-Power Protocols for Large Security-Critical Wireless Sensor Networks by Claudio S. Malavenda, F. Menichelli, M. Olivieri

    Published 2012-01-01
    “…This paper reports the analysis, implementation, and experimental testing of a delay-tolerant and energy-aware protocol for a wireless sensor node, oriented to security applications. The solution proposed takes advantages from different domains considering as a guideline the low power consumption and facing the problems of seamless and lossy connectivity offered by the wireless medium along with very limited resources offered by a wireless network node. …”
    Get full text
    Article
  15. 1315
  16. 1316

    A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment by Sanchika Gupta, Padam Kumar, Ajith Abraham

    Published 2013-03-01
    “…This paper identifies vulnerabilities responsible for well-known network based attacks on cloud and does a critical analysis on the security measures available in cloud environment. This paper focuses on a nonconventional technique for securing cloud network from malicious insiders and outsiders with the use of network profiling. …”
    Get full text
    Article
  17. 1317

    The politics of gating (A response to Private Security and Public Space by Manzi and Smith-Bowers) by Rowland Atkinson

    Published 2008-05-01
    “…Critically then the risk is that ignoring the political and normative aspects of gating, as I believe Manzi and Smith-Bowers do, may lead to further and deeper socio-spatial segregation that itself excludes the voice of social groups least able to challenge or, indeed, reside in gated developments and the additional security that they appear to offer. …”
    Get full text
    Article
  18. 1318
  19. 1319
  20. 1320

    Performance analysis and power optimization for FH secure communication under frequency and phase mismatch by Changqing SONG, Hongzhi ZHAO, Lizhi QIN, Shihai SHAO

    Published 2022-09-01
    “…The artificial noise (AN) shielded frequency hopping (FH) secure communication can counteract electromagnetic interference and wiretapping, but its carrier frequencies change rapidly within a wide bandwidth which will raise the level of carrier frequency offset and phase noise, yielding AN cancellation performance degradation.To tackle this, the signal distortion caused by frequency and phase mismatch (FPM) was mathematically modeled, the AN cancellation performance was evaluated via signal-to-noise ratio, and the system secrecy was scaled via secrecy capacity.On basis of this, the optimal power allocation scheme for AN and confidential signal was designed, and the scheme was expanded according to the FPM level and the propagation channel quality.Numerical simulations verify that FPM can significantly degrade the noise cancellation performance and system secrecy, and to counteract this, the power ratio of AN to confidential signals should decrease with an increasing FPM.…”
    Get full text
    Article