-
61
Crypto Deep Ring Topology Firewall in Sensitive Data Transmission and Retrieval in Cloud
Published 2024-01-01“…The data transmission has been performed using egress ring topology crypto encryption that solves the difficulty in isolating the traffic path between the edge and cloud network. Moreover, during the cloud data retrieval, the data interoperability issue arises due to the improper cloud service level agreement, which is solved using an application programing interface firewall fetch intrusion prevention system used in the secure transmission technique in which the data are entered into the transport and session layer of the firewall and then into the intrusion detection and prevention system thus sieving of data is carried out to solve the amenability violation of the cloud network and eliminate data interoperability issue. …”
Get full text
Article -
62
TBAS: Token-based authorization service architecture in Internet of things scenarios
Published 2017-07-01Get full text
Article -
63
Improving VANETs Connectivity with a Totally Ad Hoc Living Mobile Backbone
Published 2015-01-01Get full text
Article -
64
User Access Control and Authentication System for VoIP Service in Mobile Communication Environments
Published 2014-02-01Get full text
Article -
65
Cooperative Behaviors and Multienergy Coupling Through Distributed Energy Storage in the Peer-to-Peer Market Mechanism
Published 2025-01-01“…A consortium blockchain-based framework ensures secure and private registration. A peer-to-peer network facilitates multienergy trading, enabling efficient energy generation and storage. …”
Get full text
Article -
66
Optimization of Expression Matching for String Matching
Published 2013-01-01“…As the requirement of network security application increases, more and more redundant patterns appear and the patterns' amount of intrusion detection system(IDS)raises. …”
Get full text
Article -
67
Accelerating Deep Learning-Based Morphological Biometric Recognition with Field-Programmable Gate Arrays
Published 2025-01-01“…The FPGA is responsible for processing this system with utmost security and without any internet connectivity. Various facial recognition networks are accomplished, including AlexNet, ResNet, and VGG-16 networks. …”
Get full text
Article -
68
Optimal Scheduling of Energy Storage Systems with Private Ownership Based on a Stochastic-Robust Hybrid Optimization Model in Energy and Ancillary Services Markets
Published 2024-04-01“…The proposed formulation based on the Mixed Integer Nonlinear Programming (MINLP) model is implemented in the GAMS software environment and the results demonstrate the maximum profitability of BES in EM (21% more) and also show participation in providing ancillary services, such as reserve to provide security in incidents and reactive power to maintain stability and reduce cost and losses, despite the decrease in profit, leads to neutralizing the negative impact of uncertainties in the BES profit..…”
Get full text
Article -
69
FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review
Published 2021-03-01“… In recent days, increasing numbers of Internet and wireless network users have helped accelerate the need for encryption mechanisms and devices to protect user data sharing across an unsecured network. …”
Get full text
Article -
70
Sentralisasi Pengawasan Informasi Jaringan Menggunakan Blockchain Ethereum
Published 2020-12-01“…The method requires the network controller to periodically fetch network information from every network device and submit it as a single blockchain transaction. …”
Get full text
Article -
71
Rancang Bangun Website Akademik dengan Penyimpanan Sertifikat Digital Menggunakan Teknologi Blockchain
Published 2022-02-01“…Based on the results of research and design of the system, it can be concluded that the process of making blockchain technology as a media for issuing certificates and validation can be made using Ethereum's proprietary program Geth and data storage using smart contracts issued on the blockchain network. …”
Get full text
Article -
72
Technology transfer, intellectual property, and the fight for the soul of WHO.
Published 2024-01-01“…In response, WHO embarked in the 1950s on a visionary programme to establish a global network of non-profit, state-run drug manufacturers and scientists committed to the free exchange of knowledge. …”
Get full text
Article -
73
IoT-based home control system using NodeMCU and Firebase
Published 2024-11-01“…In addition, a PIR motion sensor was integrated into the system to enhance the home's security by detecting intrusion. The system's hardware functionality is based on a written Arduino code, which establishes Wi-Fi connectivity to a predefined network, communicates with the Firebase database, handles appliance control and manages sensor data. …”
Get full text
Article -
74
Optimal PV‐storage capacity planning for rail transit self‐consistent energy systems considering extreme weather conditions
Published 2024-12-01“…Abstract With the rapid development of electrified rail transportation, the traction load demand of rail transportation has increased sharply, and its operational security under extreme conditions has been highlighted. …”
Get full text
Article -
75
Blockchain-Driven Optimized Chaotic Encryption Scheme for Medical Image Transmission in IoT-Edge Environment
Published 2025-01-01“…To improve the security chain in IoT environment, edge computing (EC) was introduced to distribute the applications of IoT at the edge of the communication networks. …”
Get full text
Article -
76
Using rule association to generate data collection policies
Published 2021-10-01“…Collecting security-related data of devices effectively is the foundation of analyzing network threats accurately.Existing data collection methods (full data collection, sampling based data collection and adaptive data collection) do not consider the validity of the collected data and their correlation, which will consume too much collection resources, resulting in low collection yield.To address this problem, considering the factors (relationship between node attributes, network topology relationship, threat status, node resource and node similarity) that impact collection costs and benefits, a rule association method to generate collection policies was designed.In the method, two types of association rules (inter-node association rules and inter-event association rules) were adopted to generate candidate data collection items and reduced the scope of data collection.Then, a multi-objective program was designed to maximize collection benefits and minimize collection costs.Further, a genetic algorithm was designed to solve this program.Proposed method was compared with existing data collection methods.The experimental results show that the number of the collected data records of proposed method is 1 000~3 000 less than that of others per 12 hours, and the validity of the collected data of proposed method is about 4%~10% higher than others, which proves the effectiveness of the proposed method.…”
Get full text
Article -
77
Software diversity evaluation method based on the properties of ROP/JOP gadgets
Published 2022-12-01“…In order to reduce the risk of rapid spread of homogeneous attacks in network systems, and enhance network and software security, software diversification technologies are applied widely nowadays.Software diversification aims to generate functionally equivalent but internally changed program variants, thereby alter a single operating environment and mitigating homogenization attacks.The existing diversified technical evaluation index ROP gadgets survival rate is difficult to directly reflect the safety impact and the evaluation method is single.In order to evaluate the effectiveness of the diversification method more comprehensively and effectively, a software diversification evaluation method based on the properties of ROP/JOP gadgets is proposed, by analyzing common code reuse attacks, and turns abstract quantification into concrete indicators evaluates the security gain and effect of diversified methods from three aspects of space, time and quality.The method first discusses how diversification techniques affect ROP/JOP attacks according to the three properties of gadgets similarity, damage degree and availability.Nine kinds of diversification methods, such as instruction replacement, NOP insertion, and control flow flattening, are used to diversify the GNU coreutils assembly to generate diversification assembly.Experiments based on the property of gadgets are carried out on the diverse assemblies, and the effectiveness of different diversification methods and the impact on attacks are evaluated according to the experimental results.The experimental results show that this method can accurately evaluate the security gain of software diversification methods, the diversification technology will lead to the increase of the attack chain space required by the ROP/JOP attack, the longer time to construct the attack chain and the lower the attack success rate.The effects of different diversification methods are different, it has a guiding role for the follow-up research on diversified technologies with higher safety gains.…”
Get full text
Article -
78
Multifonctionnalité de l’agriculture urbaine à Montréal : étude des discours au sein du programme des jardins communautaires
Published 2010-09-01“…Research show that urban agriculture could be a solution to meet modern urban issues, as food security, population health, environmental urban services, social network and popular education. …”
Get full text
Article -
79
Possible paths towards sustainable tourism development in a high-mountain resort
Published 2009-12-01“…This text starts from the teachings stemming from an evaluation of the tourist practices in the light of sustainable tourism principles, realized in 2004 within the framework of a national network piloted by the French Agency of Touristic Engineering (today ODIT France), for the ski resort of Valloire, first-generation resort in the Maurienne, which development and modernization in the 2000s kept pace with a vast real estate program. …”
Get full text
Article -
80