Security
Security的相关文献在1986年到2023年内共计1098篇,主要集中在自动化技术、计算机技术、肿瘤学、无线电电子学、电信技术
等领域,其中期刊论文1088篇、会议论文6篇、专利文献4篇;相关期刊294种,包括个人电脑、微电脑世界、网管员世界等;
相关会议5种,包括第三届国际信息技术与管理科学学术研讨会、2011年亚太青年通信学术会议(APYCC2011)、中国通信学会第五届学术年会等;Security的相关文献由1784位作者贡献,包括Arif Sari、Sanjeev Kumar、Abdelwahed Motwakel等。
Security
-研究学者
- Arif Sari
- Sanjeev Kumar
- Abdelwahed Motwakel
- Anwer Mustafa Hilal
- Ishfaq Yaseen
- Mahmoud Ragab
- Manar Ahmed Hamza
- Mohammed Rizwanullah
- Sasith M. Rajasooriya
- Abu Sarwar Zamani
- Boris S. Verkhovsky
- Chris P. Tsokos
- Fahd N.Al-Wesabi
- HUANG Kaizhi
- Hossein Jadidoleslamy
- Pubudu Kalpani Kaluarachchi
- Radwa Marzouk
- 代颂娥
- 吴敌
- 张晨阳
- 谢宗晓
- Adel Ammar
- Adeniran Oluwaranti
- Ali Alshehri
- Amir Mohamed Talib
- Asif Shabbir
- Ayodeji Oluwatope
- Bassam A.Y.Alqaralleh
- Camilius Sanga
- Clement Onime
- Delvonei Alves de Andrade
- Denis A.Pustokhin
- Edephonce Ngemera Nfuka
- Ehab Bahaudien Ashary
- Fabio Garzia
- Fadwa Alrowais
- Fahad Aldhaban
- Fayyaz Khalid
- Georg Disterer
- Gyanendra Prasad Joshi
- Hani Alshahrani
- Harry Wechsler
- Haruhiko Nishimura
- Hossam Faris
- Huansheng Ning
- Huilong Lin
- Huirong Fu
- Irina V.Pustokhina
- JOker
- Jalil Abbas
-
-
Gulshan Kumar;
Hamed Alqahtani
-
-
摘要:
Software-Defined Networking(SDN)enables flexibility in developing security tools that can effectively and efficiently analyze and detect malicious network traffic for detecting intrusions.Recently Machine Learning(ML)techniques have attracted lots of attention from researchers and industry for developing intrusion detection systems(IDSs)considering logically centralized control and global view of the network provided by SDN.Many IDSs have developed using advances in machine learning and deep learning.This study presents a comprehensive review of recent work ofML-based IDS in context to SDN.It presents a comprehensive study of the existing review papers in the field.It is followed by introducing intrusion detection,ML techniques and their types.Specifically,we present a systematic study of recent works,discuss ongoing research challenges for effective implementation of ML-based intrusion detection in SDN,and promising future works in this field.
-
-
Suhail Qadir;
Uzair Bashir
-
-
摘要:
Information Security is determined by three well know security parameters i.e. Confidentiality, Integrity and Availability. Availability is an important pillar when it comes to security of an information system. It is dependent upon the reliability, timeliness and accessibility of the Information System. This paper presents an analytical view of the fact that when Accessibility is degraded during the presence of an ongoing attack, the other factors reliability and timeliness can also get affected, therefore creating a degrading impact on the overall Availability of the system, which eventually leads to the Denial of Service Attack and therefore affecting the security of the System.
-
-
无;
Guo Xiaobin;
Huang Jianyu;
Zhai Yucheng
-
-
摘要:
As the space gradually becomes a multi-polar and industrialized battlefield, we human beings are entering Space 3.0. In this new era, existing international rules on space arms control can no longer effectively address increasing security risks such as arms races, armed conflicts, collisions of space objects and competition for space resources. We need more than ever to achieve consensus on space security in the new era to build new space security order.
-
-
-
-
摘要:
近日,我校大数据安全与隐私保护团队在面向人机物融合系统的安全访问控制方面取得新进展。研究成果以"Specification and Adaptive Verification of Access Control Policy for CyberPhysical-Social Spaces"为题被国际权威期刊《Computers and Security》录用并上线,正式版将于2022年3月刊出,曹彦博士为第一作者,平源教授为通讯作者。
-
-
Yaoping Luo;
Yun Wan
-
-
摘要:
This paper briefly introduces the safety performance of the highway interchange design.The factors that influence the safety of the highway interchange design,was discussed in the paper based on the parts,which are the safety of the interchange location,the safety of interchange form,and the safety design of the main line in interchange.
-
-
Mohammad Kazim Hooshmand;
Doreswamy Hosahalli
-
-
摘要:
Convolutional neural networks(CNNs)are the specific architecture of feed-forward artificial neural networks.It is the de-facto standard for various operations in ma-chine learning and computer vision.To transform this performance towards the task of network anomaly detection in cyber-security,this study proposes a model using one-dimensional CNN architecture.The authors'approach divides network traffic data into transmission control protocol(TCP),user datagram protocol(UDP),and OTHER protocol categories in the first phase,then each category is treated inde-pendently.Before training the model,feature selection is performed using the Chi-square technique,and then,over-sampling is conducted using the synthetic minority over-sampling technique to tackle a class imbalance problem.The authors'method yields the weighted average f-score 0.85,0.97,0.86,and 0.78 for TCP,UDP,OTHER,and ALL categories,respectively.The model is tested on the UNSW-NB15 dataset.
-
-
陈伟
-
-
摘要:
英国于2021年12月和2022年1月接连发布《2022年国家网络战略》(National Cyber Strategy 2022)和《2022-2030年国家网络安全战略》(Government Cyber Security Strategy2022-2030),分析英国当前面临的网络安全风险,强调确保网络安全对其国家安全和发展的意义,提出构建网络生态应对持续变化的一系列举措,并把网络安全意识提高到文化的高度,对网络安全意识教育工作提出了更高要求。
-
-
Ahmed Laarfi
-
-
摘要:
This paper reviews the essential biometrics and develops a way to combine them with the Computer and User Information, giving us an Electronic Biometrics ID. This way, distributed databases contain imperative data from much helpful information that supports more security. We reviewed examples of what these databases would look like, which any responsible party could design to be global. As will be mentioned later, we obtain common international databases whose data are modified according to factors such as the owner of the device, the location of the device, and so on. This is very useful for tracking, and it combines biometrics with data set to give us a comprehensive electronic identification.
-
-
Latika Kakkar;
Deepali Gupta;
Sarvesh Tanwar;
Sapna Saxena;
Khalid Alsubhi;
Divya Anand;
Irene Delgado Noya;
Nitin Goyal
-
-
摘要:
To provide faster access to the treatment of patients,healthcare system can be integrated with Internet of Things to provide prior and timely health services to the patient.There is a huge limitation in the sensing layer as the IoT devices here have low computational power,limited storage and less battery life.So,this huge amount of data needs to be stored on the cloud.The information and the data sensed by these devices is made accessible on the internet from where medical staff,doctors,relatives and family members can access this information.This helps in improving the treatment as well as getting faster medical assistance,tracking of routine activities and health focus of elderly people on frequent basis.However,the data transmission from IoT devices to the cloud faces many security challenges and is vulnerable to different security and privacy threats during the transmission path.The purpose of this research is to design a Certificateless Secured Signature Scheme that will provide a magnificent amount of security during the transmission of data.Certificateless signature,that removes the intricate certificate management and key escrow problem,is one of the practical methods to provide data integrity and identity authentication for the IoT.Experimental result shows that the proposed scheme performs better than the existing certificateless signature schemes in terms of computational cost,encryption and decryption time.This scheme is the best combination of high security and cost efficiency and is further suitable for the resource constrained IoT environment.
-
-
Mohammed Altaf Ahmed;
Sara A Althubiti;
Dronamraju Nageswara Rao;
ELaxmi Lydia;
Woong Cho;
Gyanendra Prasad Joshi;
Sung Won Kim
-
-
摘要:
Cyberattacks are developing gradually sophisticated,requiring effective intrusion detection systems(IDSs)for monitoring computer resources and creating reports on anomalous or suspicious actions.With the popularity of Internet of Things(IoT)technology,the security of IoT networks is developing a vital problem.Because of the huge number and varied kinds of IoT devices,it can be challenging task for protecting the IoT framework utilizing a typical IDS.The typical IDSs have their restrictions once executed to IoT networks because of resource constraints and complexity.Therefore,this paper presents a new Blockchain Assisted Intrusion Detection System using Differential Flower Pollination with Deep Learning(BAIDS-DFPDL)model in IoT Environment.The presented BAIDS-DFPDLmodelmainly focuses on the identification and classification of intrusions in the IoT environment.To accomplish this,the presented BAIDS-DFPDL model follows blockchain(BC)technology for effective and secure data transmission among the agents.Besides,the presented BAIDSDFPDLmodel designs Differential Flower Pollination based feature selection(DFPFS)technique to elect features.Finally,sailfish optimization(SFO)with Restricted Boltzmann Machine(RBM)model is applied for effectual recognition of intrusions.The simulation results on benchmark dataset exhibit the enhanced performance of the BAIDS-DFPDL model over other models on the recognition of intrusions.
-
-
Jian SHEN;
Yang XU;
Yi ZHOU
- 《2011年亚太青年通信学术会议(APYCC2011)》
| 2011年
-
摘要:
Wireless communication can provide ubiquitous access to the Internet and more convenience thanwired communication. Due to the wide open nature of wireless radio, security situation of wireless network ismore serious. From the initial 802.11 to 802.11i, more robust security methods have been adopted to eliminateunderlying attacks. 802.11i is based on the assumption that all participants are honest that they will act as theyare expected. But usually it is not true. How to recognize a genuine user, how to keep authentication data safely,and how to prevent dishonest supplicant accessing WLAN are big challenges. Trusted Computing can be used toimprove security status of endpoint. Applying Trusted Computing technology can solve these challenges andenhance WLAN security.
-
-
Lingwei CHEN;
Chuanmin DONG
- 《2011年亚太青年通信学术会议(APYCC2011)》
| 2011年
-
摘要:
Computer has become part of our life and it plays an important role in our policy, economy,society and also people’s daily life. Computer security becomes a problem that everyone focuses. Computersecurity refers to the safety of computer resources. It is the problem that every user must face and solve toensure the computer not suffering harzards and threats. And it also ensures the hardware and software incomputer system operating stably and practically. The paper analyses the common issues concerning aboutsecurity of personal computer,and proposes appropriate solutions.
-
-
Wang Jianqiu1;
Lang Weimin;
Ji Yinghua1
- 《中国通信学会第五届学术年会》
| 2008年
-
摘要:
As sensor networks edge closer towards wide-spread deployment,security issues become a central concem。 Typical sensors possess limited computation,energy,computation,memory resources and they are always deployed in a harsh,unattended or hostile environment,So the Security issues posed by sensor networks represent a rich and challenging field of research problems.In this paper,we probe into various security requirements with regard to Wireless Sensor Network(WSN).Furthermore,we analyze Status quo of the security in WSN from three aspect:key management,identity authentication aswell asattacksand countermeasures. In conciusion,we point out its development direction based on the analysis and remark of problems remaining unsolved in WSN.
-
-
Lingguo WANG;
Yanping LI
- 《第三届国际信息技术与管理科学学术研讨会》
| 2011年
-
摘要:
The relationship between humans and chemicals are very close, we can not live without chemical products in modern society, from material life such as clothing, food, accommodation to spiritual life such asart, culture and entertainment, all of which need chemical products' service. The rapid development ofchemical industry has also led to the popularity of chemical machinery and its technological innovation.Therefore, the stability and service life of chemical machinery equipment have become the most concern inchemical production process. More importantly, chemical machinery equipment is different from the ordinarymachinery equipment. Once some failures happen, they caused serious accidents. This paper analyzes and summarizes some usual chemical machinery equipment accidents in daily life and industry production. ThenI will present some methods to treat and prevent chemical machinery accidents.
-
-
Lingguo WANG;
Yanping LI
- 《第三届国际信息技术与管理科学学术研讨会》
| 2011年
-
摘要:
The relationship between humans and chemicals are very close, we can not live without chemical products in modern society, from material life such as clothing, food, accommodation to spiritual life such asart, culture and entertainment, all of which need chemical products' service. The rapid development ofchemical industry has also led to the popularity of chemical machinery and its technological innovation.Therefore, the stability and service life of chemical machinery equipment have become the most concern inchemical production process. More importantly, chemical machinery equipment is different from the ordinarymachinery equipment. Once some failures happen, they caused serious accidents. This paper analyzes and summarizes some usual chemical machinery equipment accidents in daily life and industry production. ThenI will present some methods to treat and prevent chemical machinery accidents.
-
-
Lingguo WANG;
Yanping LI
- 《第三届国际信息技术与管理科学学术研讨会》
| 2011年
-
摘要:
The relationship between humans and chemicals are very close, we can not live without chemical products in modern society, from material life such as clothing, food, accommodation to spiritual life such asart, culture and entertainment, all of which need chemical products' service. The rapid development ofchemical industry has also led to the popularity of chemical machinery and its technological innovation.Therefore, the stability and service life of chemical machinery equipment have become the most concern inchemical production process. More importantly, chemical machinery equipment is different from the ordinarymachinery equipment. Once some failures happen, they caused serious accidents. This paper analyzes and summarizes some usual chemical machinery equipment accidents in daily life and industry production. ThenI will present some methods to treat and prevent chemical machinery accidents.
-
-
Lingguo WANG;
Yanping LI
- 《第三届国际信息技术与管理科学学术研讨会》
| 2011年
-
摘要:
The relationship between humans and chemicals are very close, we can not live without chemical products in modern society, from material life such as clothing, food, accommodation to spiritual life such asart, culture and entertainment, all of which need chemical products' service. The rapid development ofchemical industry has also led to the popularity of chemical machinery and its technological innovation.Therefore, the stability and service life of chemical machinery equipment have become the most concern inchemical production process. More importantly, chemical machinery equipment is different from the ordinarymachinery equipment. Once some failures happen, they caused serious accidents. This paper analyzes and summarizes some usual chemical machinery equipment accidents in daily life and industry production. ThenI will present some methods to treat and prevent chemical machinery accidents.
-
-
Lingguo WANG;
Yanping LI
- 《第三届国际信息技术与管理科学学术研讨会》
| 2011年
-
摘要:
The relationship between humans and chemicals are very close, we can not live without chemical products in modern society, from material life such as clothing, food, accommodation to spiritual life such asart, culture and entertainment, all of which need chemical products' service. The rapid development ofchemical industry has also led to the popularity of chemical machinery and its technological innovation.Therefore, the stability and service life of chemical machinery equipment have become the most concern inchemical production process. More importantly, chemical machinery equipment is different from the ordinarymachinery equipment. Once some failures happen, they caused serious accidents. This paper analyzes and summarizes some usual chemical machinery equipment accidents in daily life and industry production. ThenI will present some methods to treat and prevent chemical machinery accidents.
-
-