Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1441
Big data security analysis method based on self-update threat intelligence database
Published 2018-03-01“…Big data security analysis method is generally based on the existing signature database to detect and match malicious behaviors.This method can only detect known attacks and can't analyze and judge new types of unknown attacks and complex variant attacks.Through the big data analysis technology,the collected data was extracted for safety value,and the value conversion from the collected data,threat information,threat knowledge to threat intelligence was realized,high-value threat intelligence of forming hidden,value selective,adversarial,predictive,and decision-making,evidence-based,time-sensitive was formed.Firstly,the limitations of the existing security analysis methods were analyzed.Then the construction method of threat intelligence database was introduced in detail.Finally,the security analysis method of big data based on self-renewing threat information database was described.The analysis of big data security based on the self-updated threat intelligence database could mine the hidden threats in internet data effectively and strengthen the existing security protection capabilities of internet companies so that the preemptive defense initiative could be mastered during the security game.…”
Get full text
Article -
1442
A deep learning‐based framework to identify and characterise heterogeneous secure network traffic
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
1443
Organized Illegal Migration as Manifestation of Transnational Criminality and Source of Threats to National Security of Ukraine
Published 2021-07-01Subjects: Get full text
Article -
1444
Parental involvement in residential child care: helping parents to provide a secure base
Published 2011-02-01“…This method builds on the idea of secure base and ensures that parents maintain the responsibility for the upbringing of their child and that they have a say in arrangements in the youth care process. …”
Article -
1445
JAPANESE DIPLOMACY WITHIN ASEAN REGIONAL FORUM (ARF): SOME ASPECTS OF THE REGIONAL SECURITY
Published 2013-08-01Subjects: Get full text
Article -
1446
The Role of the Commercial Space Industry within the US National Security under the Trump Administration
Published 2021-04-01Subjects: Get full text
Article -
1447
Low-cost group-based identity security authentication protocol for NB-IoT nodes
Published 2021-12-01Subjects: “…group-based identity security authentication protocol…”
Get full text
Article -
1448
Cayley–Purser secured communication and jackknife correlative classification for COVID patient data analysis
Published 2025-02-01Subjects: Get full text
Article -
1449
Research and practice on data center security architecture refactoring based on intelligent service chain
Published 2024-11-01Subjects: Get full text
Article -
1450
A Secure Image Steganography Using Shark Smell Optimization and Edge Detection Technique
Published 2022-10-01Subjects: Get full text
Article -
1451
Strategic Health Diplomacy: An Indonesia’s Approach in Securing COVID-19 Booster Vaccine Supplies
Published 2024-06-01“…This study provides an in-depth analysis of Indonesia’s health diplomacy strategy in securing booster vaccines for COVID-19, a critical component in mitigating the impact of the pandemic. …”
Get full text
Article -
1452
ECONOMIC SECURITY DOMINANTS OF THE RUSSIAN INDUSTRIAL ORGANIZATIONS WITH PARTICIPATION OF STATE IN CAPITAL: CHRONICLES OF AVTOVAZ
Published 2018-09-01Subjects: Get full text
Article -
1453
LiteST: a lightweight secure time synchronization protocol for wireless sensor networks
Published 2009-01-01Subjects: Get full text
Article -
1454
Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology
Published 2022-01-01“…In order to detect the computer network security technology vulnerabilities due to various factors, the normal operation of the computer network must be ensured, the user’s confidential information must be protected, and it is proposed that the analysis and research on security vulnerability detection must be strengthened. …”
Get full text
Article -
1455
THE ROLE OF ENGINEERING PEDAGOGY IN THE SOLUTION OF SECURITY PROBLEMS ON AUTOMOBILE TRANSPORT AND IN THE SPHERE OF ROAD MAINTENANCE
Published 2022-05-01Subjects: Get full text
Article -
1456
A Secure Learned Image Codec for Authenticity Verification via Self-Destructive Compression
Published 2025-01-01Subjects: “…secure learned image codec…”
Get full text
Article -
1457
Ransomware on cyber-physical systems: Taxonomies, case studies, security gaps, and open challenges
Published 2024-01-01Subjects: Get full text
Article -
1458
Risk management in the sphere of state economic security provision using professional liability insurance
Published 2019-08-01Subjects: Get full text
Article -
1459
Role-based abstract modeling of blockchain auction contracts and verification of temporal security and fairness
Published 2024-10-01Subjects: Get full text
Article -
1460
Exploring the Integration of Blockchain and Distributed DevOps for Secure, Transparent, and Traceable Software Development
Published 2025-01-01“…However, it does suffer from a lack of security, transparency, and traceability, which can result in project delays, a lack of trust between stakeholders, and even project failure. …”
Get full text
Article