Showing 1,441 - 1,460 results of 9,720 for search '"security"', query time: 0.09s Refine Results
  1. 1441

    Big data security analysis method based on self-update threat intelligence database by Yanfang HOU, Jinhua WANG

    Published 2018-03-01
    “…Big data security analysis method is generally based on the existing signature database to detect and match malicious behaviors.This method can only detect known attacks and can't analyze and judge new types of unknown attacks and complex variant attacks.Through the big data analysis technology,the collected data was extracted for safety value,and the value conversion from the collected data,threat information,threat knowledge to threat intelligence was realized,high-value threat intelligence of forming hidden,value selective,adversarial,predictive,and decision-making,evidence-based,time-sensitive was formed.Firstly,the limitations of the existing security analysis methods were analyzed.Then the construction method of threat intelligence database was introduced in detail.Finally,the security analysis method of big data based on self-renewing threat information database was described.The analysis of big data security based on the self-updated threat intelligence database could mine the hidden threats in internet data effectively and strengthen the existing security protection capabilities of internet companies so that the preemptive defense initiative could be mastered during the security game.…”
    Get full text
    Article
  2. 1442
  3. 1443
  4. 1444

    Parental involvement in residential child care: helping parents to provide a secure base by Esther M.W. Geurts, Marc J. Noom, Erik J. Knorth

    Published 2011-02-01
    “…This method builds on the idea of secure base and ensures that parents maintain the responsibility for the upbringing of their child and that they have a say in arrangements in the youth care process. …”
    Article
  5. 1445
  6. 1446
  7. 1447

    Low-cost group-based identity security authentication protocol for NB-IoT nodes by Xiangmao CHANG, Jun ZHAN, Zhiwei WANG

    Published 2021-12-01
    Subjects: “…group-based identity security authentication protocol…”
    Get full text
    Article
  8. 1448
  9. 1449
  10. 1450
  11. 1451

    Strategic Health Diplomacy: An Indonesia’s Approach in Securing COVID-19 Booster Vaccine Supplies by Deasy Silvya Sari, Mas Halimah, Akim Akim, Renata Maximillian, Fakhri Sabiq Muawal, Nathanael Jusac Lie

    Published 2024-06-01
    “…This study provides an in-depth analysis of Indonesia’s health diplomacy strategy in securing booster vaccines for COVID-19, a critical component in mitigating the impact of the pandemic. …”
    Get full text
    Article
  12. 1452
  13. 1453
  14. 1454

    Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology by Xiaokun Zheng

    Published 2022-01-01
    “…In order to detect the computer network security technology vulnerabilities due to various factors, the normal operation of the computer network must be ensured, the user’s confidential information must be protected, and it is proposed that the analysis and research on security vulnerability detection must be strengthened. …”
    Get full text
    Article
  15. 1455
  16. 1456
  17. 1457
  18. 1458
  19. 1459
  20. 1460

    Exploring the Integration of Blockchain and Distributed DevOps for Secure, Transparent, and Traceable Software Development by Junaid Nasir Qureshi, Muhammad Shoaib Farooq, Usman Ali, Adel Khelifi, Zabihullah Atal

    Published 2025-01-01
    “…However, it does suffer from a lack of security, transparency, and traceability, which can result in project delays, a lack of trust between stakeholders, and even project failure. …”
    Get full text
    Article