Academic literature on the topic 'Data transmission systems Security measures'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data transmission systems Security measures.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Data transmission systems Security measures"

1

Li, Feng, and Hai Ying Wang. "Designed on Information Security Systems for Mobile Databases." Advanced Materials Research 915-916 (April 2014): 1424–27. http://dx.doi.org/10.4028/www.scientific.net/amr.915-916.1424.

Full text
Abstract:
In this paper, the existing transmission network message transfer protocol and conducted in-depth analysis to identify which existing security measures and the presence of hidden proposed secure data transmission scheme. The program takes into account the feasibility of the existing network to transmit messages that programs load capacity, on the other hand give full consideration to the needs of users, providing different levels of security services for different users.
APA, Harvard, Vancouver, ISO, and other styles
2

Shen, Yang. "Research on Internet Information Security in the Big Data Era." E3S Web of Conferences 218 (2020): 04008. http://dx.doi.org/10.1051/e3sconf/202021804008.

Full text
Abstract:
In the era of big data, due to the great influence of big data itself, Internet information security has also become the focus of attention. In order to avoid disturbing people’s lives, this article summarizes the opportunities and challenges in the era of big data based on previous work experience. This article analyzes and studies five aspects including establishing complete laws and regulations, protecting personal information, applying big data technology to public security systems, doing a good job in data management and classification, and ensuring the security of data transmission. The author discusses specific measures for the maintenance of Internet information security in the era of big data from the above five aspects.
APA, Harvard, Vancouver, ISO, and other styles
3

Khan, Muhammad Amir, Jawad Khan, Nabila Sehito, Khalid Mahmood, Haider Ali, Inam Bari, Muhammad Arif, and Raania M. Ghoniem. "An Adaptive Enhanced Technique for Locked Target Detection and Data Transmission over Internet of Healthcare Things." Electronics 11, no. 17 (August 30, 2022): 2726. http://dx.doi.org/10.3390/electronics11172726.

Full text
Abstract:
The incredible advancements in data transmission technology have opened up more potentials for data security than ever before. Numerous methods for data protection have been developed during the previous decades, including steganography and cryptography. The security and integrity of medical data have emerged as major barriers for healthcare service systems as the Internet of Things has evolved dramatically in the healthcare business. Communication between two devices securely is a difficult problem. Numerous cryptographic algorithms are already available, including data encryption standard (DES), Rivest–Shamir–Adleman (RSA), and advanced encryption standard (AES). In this paper, we present a hybrid security model for the protection of diagnostic text data contained in medical photographs. The proposed model is built by combining a proposed hybrid encryption system with either a 2D Discrete Wavelet Transform 1 Level (2D-DWT-1L) or a 2D Discrete Wavelet Transform 2 Level (2D-DWT-2L) steganography technique. The suggested model encrypts secret data and hides them using 2D-DWT-3L. As text covers, color and grayscale images are employed. The suggested system’s performance was tested using PSNR, SSIM, MSE, and Correlation. Associated to state-of-the-art approaches, the proposed model masked personal patient data with high capacity, imperceptibility and minimum deterioration in the received stego-image. We use MATLAB to build the proposed mechanism, and measures such as throughput and execution time are used to assess performance.
APA, Harvard, Vancouver, ISO, and other styles
4

Mallikarjuna Shastry P.M, Prasanthi Konduru,. "Huffman Coding and Multi-Generation Mixing Assisted Network Coding Based MAC for QoS-Centric Secure Data Communication over MANETs." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 5, 2021): 2146–66. http://dx.doi.org/10.17762/turcomat.v12i6.4820.

Full text
Abstract:
The exponential rise in wireless transmission has gained widespread attention to meet major mobile communication purposes including, Internet of Things (IoT) and Machine-to-Machine (M2M) communications. Mobile Ad-hoc Network (MANET) has emerged as one of the most viable solution to meet aforesaid mobile communication purposes; however, being decentralized and infrastructure-less network it undergoes adversaries including dynamic topology and security breaches due to malicious node attachment during routing. On the contrary, data security and allied Quality-of-Service (QoS) provision are inevitable in NextGen communication systems. Unlike routing-based security measures, Medium Access Control (MAC) based approaches are found more effective for MANETs. However, most of the classical MAC designs either address QoS or security as standalone objective. Unlike existing MAC solutions, in this paper a state-of-art novel Huffman Coding and Multi-Generation Mixing (MGM) assisted random linear network model-based MAC design (HM2-MAC) is proposed for MANET. Realizing the robustness of the network coding algorithms towards reliable, secure and error-free multicast transmission, we designed HM2-MAC in such manner that Huffman coding helps securing the source data packets, while MGM concept enables reduction in redundant packets to make overall communication resource efficient and secure. Unlike redundant packet-per-generation, MGM concept helps in reducing redundant transmission and hence achieves resource efficiency. Since, in HM2-MAC model the coefficient matrix used to encode the data is known only to the sink, no intermediate node can decode it or can pollute it. It makes multicast transmission more secure over MANET. Additionally, the use of iterative buffer flush technique preserves resources or buffer to accommodate more data for transmission and hence higher throughput. Noticeably, error sensitive packetization and MGM control strengthens our proposed model to retain optimal performance. HM2-MAC has been applied as a sub-layer of native IEEE 802.11 MAC and hence retains backward compatibility towards real-world implementation. MATLAB based simulation revealed that our proposed HM2-MAC protocol achieved almost 99.6% throughput even under varying link-loss patterns, which reveals its robustness to ensure QoS delivery with secure data transmission in MANET.
APA, Harvard, Vancouver, ISO, and other styles
5

Storm van Leeuwen, Daan, Ali Ahmed, Craig Watterson, and Nilufar Baghaei. "Contact Tracing: Ensuring Privacy and Security." Applied Sciences 11, no. 21 (October 25, 2021): 9977. http://dx.doi.org/10.3390/app11219977.

Full text
Abstract:
Faced with the biggest virus outbreak in a century, world governments at the start of 2020 took unprecedented measures to protect their healthcare systems from being overwhelmed in the light of the COVID-19 pandemic. International travel was halted and lockdowns were imposed. Many nations adopted measures to stop the transmission of the virus, such as imposing the wearing of face masks, social distancing, and limits on social gatherings. Technology was quickly developed for mobile phones, allowing governments to track people’s movements concerning locations of the virus (both people and places). These are called contact tracing applications. Contact tracing applications raise serious privacy and security concerns. Within Europe, two systems evolved: a centralised system, which calculates risk on a central server, and a decentralised system, which calculates risk on the users’ handset. This study examined both systems from a threat perspective to design a framework that enables privacy and security for contact tracing applications. Such a framework is helpful for App developers. The study found that even though both systems comply with the General Data Protection Regulation (GDPR), Europe’s privacy legislation, the centralised system suffers from severe risks against the threats identified. Experiments, research, and reviews tested the decentralised system in various settings but found that it performs better but still suffers from inherent shortcomings. User tracking and re-identification are possible, especially when users report themselves as infected. Based on these data, the study identified and validated a framework that enables privacy and security. The study also found that the current implementations using the decentralised Google/Apple API do not comply with the framework.
APA, Harvard, Vancouver, ISO, and other styles
6

Sokolovsky, S. P. "PARAMETRIC OPTIMIZATION OF INFORMATION SYSTEMS FOR PROACTIVE PROTECTION OF DATA TRANSMISSION SERVICE FROM NETWORK RECONNAISSANCE." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 215 (May 2022): 49–57. http://dx.doi.org/10.14489/vkit.2022.05.pp.049-057.

Full text
Abstract:
The analysis of the FTP protocol revealed a number of vulnerabilities in it, which can be used by an adversary to uncover the IDs of data transfer service clients and compromise the used network security features. On the one hand, it is due to the possibility of repeated authorization attempts to unauthorized clients, allowing to implement a data transfer service username and password. On the other hand, the implementation of reactive measures of protection, which consists in breaking the control connection to the adversary after a number of unsuccessful authorization attempts, forcing him to change the strategy of exposure. In this regard, the use of proactive protection measures, allowing to increase the time of dialog interaction with the intruder and imposing restrictions on computing and temporal resources used by the intruder, is proposed as a countermeasure to the network reconnaissance tools. The essence of proactive protection measures consists in splitting the response of FTP server to unauthorized client commands into fragments and sending those fragments to the intruder after a specified delay time. Application of proactive protection gives the security system of information system a number of advantages over the intruder in using the time resource, allowing to implement additional protection measures. The problematic issues when implementing proactive protection measures for data transmission service of information systems are, firstly, the need to send fragments of response to the intruder at intervals shorter than the timeout time of waiting for these responses, set by the intruder. Secondly, the possibility of sending to the violator the limited number of fragments of response, that is caused by FTP protocol capabilities, regulating the size of response, as well as the excessive saturation of the communication channel by fragments of messages, that can lead to exhaustion of the resource opportunities of data transmission medium. Therefore, there is a need to find the optimal parameters of the information system in the configuration of data transmission parameters in the interaction with the network reconnaissance tools. The process of information system՚s data transmission service functioning under the influence of network reconnaissance tools is formalized in the form of a Markov random process with discrete states and continuous time. Intensities of streams of events, under which the system passes from state to state, are the input data for solving the task of finding the optimal parameters of the information system for the situation under consideration. The qualitative formulation of the task of determining the optimal parameters of the information system is formulated as follows: using a given mathematical model of the information system՚s data transmission service under conditions of network reconnaissance we should find such a set of parameters of information system՚s functioning, in which the maximum efficiency of its protection while ensuring a given level of availability is provided. The problem under consideration is a vector (multi-criteria) parametric optimization problem, which will be reduced to single-criteria (scalar) optimization by constraint method (main criterion). Main criterion method implies selection of one scalar target function and transfer of other target functions into additional restriction functions. As the constraints for solving the optimization problem set resource constraints, characterized by the coefficient of the transmission medium, as well as the condition of a given level of robustness of the information system, characterized by the number of conditionality of the matrix of the intensity of the flow of events. The research applies a nonlinear optimization algorithm, an annealing simulation algorithm that provides the ability to approximate the search for a global extremum. The results obtained during the study are presented in the form of an assortment of graphic dependences of changes in the optimal parameters of the information system on the intensity of the impact of network reconnaissance means and the imposed constraints.
APA, Harvard, Vancouver, ISO, and other styles
7

Pathak, Gaurav, Jairo Gutierrez, and Saeed Ur Rehman. "Security in Low Powered Wide Area Networks: Opportunities for Software Defined Network-Supported Solutions." Electronics 9, no. 8 (July 25, 2020): 1195. http://dx.doi.org/10.3390/electronics9081195.

Full text
Abstract:
The Internet of things (IoT) has revolutionized the use of connectivity and has given birth to new transmission technologies to satisfy the requirements of diverse IoT applications. Low powered wide area networks (LPWAN) is one of those transmission technologies, and is becoming exceptionally useful for IoT applications. The nodes use energy-efficient mechanisms for long-range data transmission (10–20 km), lasting in hostile environments for years and making them suitable for IoT applications such as environmental monitoring, automated billing systems, smart homes, smart offices, and patient monitoring. However, LPWAN devices have minimal resources, which makes it challenging to provide promising security to devices and data in the network. In this paper, we discuss the security mechanisms used in current LPWAN technologies along with their vulnerabilities and possible attacks on them. A detailed literature review is conducted on existing solutions on the security of constrained IoT networks similar to LPWAN using different networking frameworks. The reviewed literature is then compared based on various network security measures addressed by them. In addition, the emergence of software defined network (SDN) architecture for security in IoT is explained based on literature. Finally, the applicability of SDN in LPWAN security, its opportunities, and challenges in implementation are discussed.
APA, Harvard, Vancouver, ISO, and other styles
8

Bagul, Riya, Atharva Karaguppi, Vishwas Karale, Mudit Singal, and Dr Vaishali Ingale. "A Dynamic and Highly Configurable Crypto-Processor for brief communication interval." Journal of University of Shanghai for Science and Technology 23, no. 05 (May 25, 2021): 551–61. http://dx.doi.org/10.51201/jusst/21/05162.

Full text
Abstract:
In modern computing systems data security is of paramount importance. The data transfer must be made secure because it can be significantly sensitive for any organization involved. This paper expounds a SOC architecture to facilitate end to end secure data exchange for applications involving short communication intervals. This SOC has been designed to behave as a co-processor which along with a standard general-purpose processor would serve as a cryptosystem. The SOC employs two famous algorithms – RSA and AES for cryptography. In contrast to usual single key cryptographic systems, this paper tries to elaborate an innovative methodology involving dynamic security measures that makes the system distributed rather than making it central to a specific algorithm and hence a particular key. The methodology involves generating and using an AES key for data encryption and RSA key for secure transfer of the AES key between the point of transmission and reception.
APA, Harvard, Vancouver, ISO, and other styles
9

Martin Boros, Matej Kucera, Andrej Velas, and Jan Valouch. "Possibilities for Experimental Testing of Alarm Transmission Systems." Communications - Scientific letters of the University of Zilina 22, no. 2 (April 1, 2020): 123–28. http://dx.doi.org/10.26552/com.c.2020.2.123-128.

Full text
Abstract:
In the current digital era, information is a basis of some systems. In the area of information, great emphasis is also placed on its security and possibilities of use. The basis of the alarm transmission system is information about the protected object, which is transmitted to the remote center of the alarm transmission system. Operators of alarm transmission system centers should be obliged to carry out regular testing of the availability of individual transmission networks. At present, there is a trend that those tests are carried out by telephone calls between the two technicians and the time of transmission of information is measured utilizing a stopwatch. To automate this process, a test facility has been created that can simulate and record the intrusion of a protected object. Initial experimental tests have ascertained whether it is possible, with the test equipment, to generate the data necessary to assess the reliability of alarm transmission systems.
APA, Harvard, Vancouver, ISO, and other styles
10

Kumari, Kimmi, and M. Mrunalini. "IoT Big Data Security, Privacy and Challenges Related to Smart Grid." International Journal of Wireless Networks and Broadband Technologies 8, no. 2 (July 2019): 1–10. http://dx.doi.org/10.4018/ijwnbt.2019070101.

Full text
Abstract:
The highly interconnected network of heterogeneous devices which enables all kinds of communications to take place in an efficient manner is referred to as “IOT.” In the current situation, the data are increasing day by day in size as well as in terms of complexities. These are the big data which are in huge demand in the industrial sectors. Various IT sectors are adopting big data present on IOT for the growth of their companies and fulfilling their requirements. But organizations are facing a lot of security issues and challenges while protecting their confidential data. IOT type systems require security while communications which is required currently by configuration levels of security algorithms, but these algorithms give more priority to functionalities of the applications over security. Smart grids have become one of the major subjects of discussions when the demands for IOT devices increases. The requirements arise related to the generation and transmission of electricity, consumption of electricity being monitored, etc. The system which is responsible to collect heterogeneous data are a complicated structure and some of its major subsystems which they require for smooth communications include log servers, smart meters, appliances which are intelligent, different sensors chosen based on their requirements, actuators with proper and efficient infrastructure. Security measures like collection, storage, manipulations and a massive amount of data retention are required as the system is highly diverse in its architecture and even the heterogeneous IOT devices are interacting with each other. In this article, security challenges and concerns of IOT big data associated with smart grid are discussed along with the new security enhancements for identification and authentications of things in IOT big data environments.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Data transmission systems Security measures"

1

Tandon, Prateek. "High-performance advanced encryption standard (AES) security co-processor design." Thesis, Available online, Georgia Institute of Technology, 2004:, 2003. http://etd.gatech.edu/theses/available/etd-04082004-180433/unrestricted/tandon%5fprateek%5f200312%5fms.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Beckman, Joseph M. "Legal requirements of secure systems." Thesis, Kansas State University, 1985. http://hdl.handle.net/2097/9822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fernandez, Irma Becerra. "Encryption-based security for public networks : technique and application." FIU Digital Commons, 1994. http://digitalcommons.fiu.edu/etd/3296.

Full text
Abstract:
This dissertation describes the development of a new system whereby the Public Switch Telephone Network (PSTN), which is not secure, can perform like a private network. Integrated Services Digital Network (ISDN) forms a technical platform for other communication technologies, such as frame relay and Switched Megabit Data Service (SMDS). This is an original and innovative hardware and software design which can be embedded into the ISDN Customer Premises Equipment (CPE) to privatize the public ISDN without the need to upgrade the existing switching equipment. This research incorporates original design and development of the following hardware and software modules to provide real-time encryption and decryption of images and data in the ISDN medium: 1. ISDN Communications Module with customized Caller-ID access. 2. Token Access Control module for secure log-in. 3. A Hybrid Cryptographic Module, public key for key management and authentication, and private key for privacy. This Cryptographic module, the Security Extension Module to the Terminal Adapter (SEMTA), was implemented in software, and then optimized in hardware. This work proves that medical images and legal documents can be transmitted through the PSTN without any security breach, guaranteeing the privacy, confidentiality, and authenticity of the data.
APA, Harvard, Vancouver, ISO, and other styles
4

Mayisela, Simphiwe Hector. "Data-centric security : towards a utopian model for protecting corporate data on mobile devices." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011094.

Full text
Abstract:
Data-centric security is significant in understanding, assessing and mitigating the various risks and impacts of sharing information outside corporate boundaries. Information generally leaves corporate boundaries through mobile devices. Mobile devices continue to evolve as multi-functional tools for everyday life, surpassing their initial intended use. This added capability and increasingly extensive use of mobile devices does not come without a degree of risk - hence the need to guard and protect information as it exists beyond the corporate boundaries and throughout its lifecycle. Literature on existing models crafted to protect data, rather than infrastructure in which the data resides, is reviewed. Technologies that organisations have implemented to adopt the data-centric model are studied. A utopian model that takes into account the shortcomings of existing technologies and deficiencies of common theories is proposed. Two sets of qualitative studies are reported; the first is a preliminary online survey to assess the ubiquity of mobile devices and extent of technology adoption towards implementation of data-centric model; and the second comprises of a focus survey and expert interviews pertaining on technologies that organisations have implemented to adopt the data-centric model. The latter study revealed insufficient data at the time of writing for the results to be statistically significant; however; indicative trends supported the assertions documented in the literature review. The question that this research answers is whether or not current technology implementations designed to mitigate risks from mobile devices, actually address business requirements. This research question, answered through these two sets qualitative studies, discovered inconsistencies between the technology implementations and business requirements. The thesis concludes by proposing a realistic model, based on the outcome of the qualitative study, which bridges the gap between the technology implementations and business requirements. Future work which could perhaps be conducted in light of the findings and the comments from this research is also considered.
APA, Harvard, Vancouver, ISO, and other styles
5

Alkhaldi, Rawan. "Spatial data transmission security authentication of spatial data using a new temporal taxonomy /." abstract and full text PDF (free order & download UNR users only), 2005. http://0-gateway.proquest.com.innopac.library.unr.edu/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1433280.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, Yung-Chuan. "A multi-stage framework on data transmission security for asymmetric systems /." Available to subscribers only, 2005. http://proquest.umi.com/pqdweb?did=1221743771&sid=21&Fmt=2&clientId=1509&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Coertze, Jacques Jacobus. "A framework for information security governance in SMMEs." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1014083.

Full text
Abstract:
It has been found that many small, medium and micro-sized enterprises (SMMEs) do not comply with sound information security governance principles, specifically the principles involved in drafting information security policies and monitoring compliance, mainly as a result of restricted resources and expertise. Research suggests that this problem occurs worldwide and that the impact it has on SMMEs is great. The problem is further compounded by the fact that, in our modern-day information technology environment, many larger organisations are providing SMMEs with access to their networks. This results not only in SMMEs being exposed to security risks, but the larger organisations as well. In previous research an information security management framework and toolbox was developed to assist SMMEs in drafting information security policies. Although this research was of some help to SMMEs, further research has shown that an even greater problem exists with the governance of information security as a result of the advancements that have been identified in information security literature. The aim of this dissertation is therefore to establish an information security governance framework that requires minimal effort and little expertise to alleviate governance problems. It is believed that such a framework would be useful for SMMEs and would result in the improved implementation of information security governance.
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Cong, and 張聰. "Design of Anonymity scheme for communication systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31228100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ma, Chunyan. "Mathematical security models for multi-agent distributed systems." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2568.

Full text
Abstract:
This thesis presents the developed taxonomy of the security threats in agent-based distributed systems. Based on this taxonomy, a set of theories is developed to facilitate analyzng the security threats of the mobile-agent systems. We propose the idea of using the developed security risk graph to model the system's vulnerabilties.
APA, Harvard, Vancouver, ISO, and other styles
10

Fragkos, Grigorios. "Near real-time threat assessment using intrusion detection system's data." Thesis, University of South Wales, 2011. https://pure.southwales.ac.uk/en/studentthesis/near-realtime-threat-assessment-using-intrusion-detection-systems-data(96a9528f-f319-4125-aaf0-71593bb61b56).html.

Full text
Abstract:
The concept of Intrusion Detection (ID) and the development of such systems have been a major concern for scientists since the late sixties. In recent computer networks, the use of different types of Intrusion Detection Systems (IDS) is considered essential and in most cases mandatory. Major improvements have been achieved over the years and a large number of different approaches have been developed and applied in the way these systems perform Intrusion Detection. The purpose of the research is to introduce a novel approach that will enable us to take advantage of the vast amounts of information generated by the large number of different IDSs, in order to identify suspicious traffic, malicious intentions and network attacks in an automated manner. In order to achieve this, the research focuses upon a system capable of identifying malicious activity in near real-time, that is capable of identifying attacks while they are progressing. The thesis addresses the near real-time threat assessment by researching into current state of the art solutions. Based on the literature review, current Intrusion Detection technologies lean towards event correlation systems using different types of detections techniques. Instead of using linear event signatures or rule sets, the thesis suggests a structured description of network attacks based on the abstracted form of the attacker’s activity. For that reason, the design focuses upon the description of network attacks using the development of footprints. Despite the level of knowledge, capabilities and resources of the attacker, the system compares occurring network events against predefined footprints in order to identify potential malicious activity. Furthermore, based on the implementation of the footprints, the research also focuses upon the design of the Threat Assessment Engine (TAE) which is capable of performing detection in near real-time by the use of the above described footprints. The outcome of the research proves that it is possible to have an automated process performing threat assessment despite the number of different ongoing attacks taking place simultaneously. The threat assessment process, taking into consideration the system’s architecture, is capable of acting as the human analyst would do when investigating such network activity. This automation speeds up the time-consuming process of manually analysing and comparing data logs deriving from heterogeneous sources, as it performs the task in near real-time. Effectively, by performing the this task in near real-time, the proposed system is capable of detecting complicated malicious activity which in other cases, as currently performed, it would be difficult, maybe impossible or results would be generated too late.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Data transmission systems Security measures"

1

Rao, Yarlagadda R. K., ed. Data transportation and protection. New York: Plenum Press, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Davies, Donald Watts. Security for computer networks: An introduction to data security in teleprocessing and electronic funds transfer. 2nd ed. Chichester [England]: Wiley, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

L, Price W., ed. Security for computer networks: An introduction to data security in teleprocessing and electronic funds transfer. 2nd ed. Chichester: Wiley, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Symposium Electromagnetic Security for Information Protection (1991 Rome, Italy). Proceedings. Rome: Fondazione Ugo Bordoni, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Computer & Communications Security '86 (1986 New York, N.Y.). Conference proceedings. Des Plaines, IL: Cahners Exposition Group, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

ACM Conference on Computer and Communications Security (6th 1999 Singapore). 6th ACM Conference on Computer and Communications Security: November 2-4,1999, Kent Ridge Digital Labs. New York: Association for Computing Machinery, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Standardization, International Organization for. Information processing systems: Open systems interconnection, basic reference model. [Geneva, Switzerland?]: The Organzation, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Standardization, International Organization for. Information processing systems: Open systems interconnection, basic reference model. [Geneva, Switzerland?]: The Organization, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Standardization, International Organization for. Information processing systems: Open systems interconnection, basic reference model. [Geneva, Switzerland?]: The Organization, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Xin xi an quan guan li lun. Beijing Shi: Jun shi ke xue chu ban she, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Data transmission systems Security measures"

1

Wang, Haijun, Yanan Zhang, and Chao Ma. "Data Security Management Implementation Measures for Intelligent Connected Vehicles (ICVs)." In Advances in Intelligent Systems and Computing, 594–600. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-63089-8_38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Topór-Kamiński, Tadeusz, Beata Krupanek, and Jarosław Homa. "Delays Models of Measurement and Control Data Transmission Network." In Advanced Technologies for Intelligent Systems of National Border Security, 257–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-31665-4_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Bin, Long Guo, and Peng Xu. "Computer Network Security and Preventive Measures Based on Big Data Technology." In Advances in Intelligent Systems and Computing, 656–63. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4572-0_94.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fakude, Nhlakanipho C., Ayoturi T. Akinola, and Mathew O. Adigun. "The Effect of Data Transmission and Storage Security Between Device–Cloudlet Communication." In Advances in Intelligent Systems and Computing, 307–19. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-32-9343-4_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Holzinger, Andreas, Bernhard Ofner, Christof Stocker, André Calero Valdez, Anne Kathrin Schaar, Martina Ziefle, and Matthias Dehmer. "On Graph Entropy Measures for Knowledge Discovery from Publication Network Data." In Availability, Reliability, and Security in Information Systems and HCI, 354–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40511-2_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dule, Chhaya S., and H. A. Girijamma. "Guaging the Effectivity of Existing Security Measures for Big Data in Cloud Environment." In Advances in Intelligent Systems and Computing, 209–19. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-57141-6_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Jinsub, and Lang Tong. "Against Data Attacks on Smart Grid Operations: Attack Mechanisms and Security Measures." In Cyber Physical Systems Approach to Smart Electric Power Grid, 359–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-45928-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Xia, Ping. "Data Security Risk and Preventive Measures of Virtual Cloud Server Based on Cloud Computing." In Advances in Intelligent Systems and Computing, 40–45. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43306-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Baldoni, Sara, Giuseppe Celozzi, Alessandro Neri, Marco Carli, and Federica Battisti. "Inferring Anomaly Situation from Multiple Data Sources in Cyber Physical Systems." In Cyber-Physical Security for Critical Infrastructures Protection, 67–76. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-69781-5_5.

Full text
Abstract:
AbstractCyber physical systems are becoming ubiquitous devices in many fields thus creating the need for effective security measures. We propose to exploit their intrinsic dependency on the environment in which they are deployed to detect and mitigate anomalies. To do so, sensor measurements, network metrics, and contextual information are fused in a unified security architecture. In this paper, the model of the proposed framework is presented and a first proof of concept involving a telecommunication infrastructure case study is provided.
APA, Harvard, Vancouver, ISO, and other styles
10

Palestini, Luigi, and Giorgio Binotti. "Image/Data Transmission Systems of the Italian Fire and Rescue Service in Emergency Contexts: An Overview of Methods and Technologies to Support Decision-Making." In Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference, 129–39. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-91791-7_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Data transmission systems Security measures"

1

KANDROUCH, Ibtissame, Chaimae SAADI, Nabil HMINA, and Habiba CHAOUI. "Security Measures Assessment for Big Data Management Systems." In 2019 5th International Conference on Optimization and Applications (ICOA). IEEE, 2019. http://dx.doi.org/10.1109/icoa.2019.8727699.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jankovic, Dejan Z. "Key security measures for personal data protection in IT systems." In 2012 20th Telecommunications Forum Telfor (TELFOR). IEEE, 2012. http://dx.doi.org/10.1109/telfor.2012.6419152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Krebs, R., E. Lerch, O. Ruhle, S. Gal, F. Lazar, and D. Paunescu. "Future distribution systems with dispersed generation will require network security measures as transmission systems of today." In Energy Society General Meeting. IEEE, 2008. http://dx.doi.org/10.1109/pes.2008.4596211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

He, Binying. "Discussion on Computer Information Network Security Measures in the Era of Data Autonomy." In 2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, 2022. http://dx.doi.org/10.1109/icesc54411.2022.9885661.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Baolong, Lei, Liu Tong, Shao Changyou, Guo Hailong, and Ge Yiyong. "High-reliability Data Transmission Mechanism across Security Zones Supporting Heterogeneous Systems." In 2022 IEEE 5th International Conference on Information Systems and Computer Aided Education (ICISCAE). IEEE, 2022. http://dx.doi.org/10.1109/iciscae55891.2022.9927544.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ch, Smitha Chowdary, Srilakshmi Puli, Lakshmi Viveka K, and M. V. B. T. Santhi. "Machine Learning Based Data Security Model Using Blockchain for Secure Data Transmission in IoT." In 2021 Second International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, 2021. http://dx.doi.org/10.1109/icesc51422.2021.9532659.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Armanuzzaman, Md, Kazi Md Rokibul Alam, Md Mehadi Hassan, and Yasuhiko Morimoto. "A secure and efficient data transmission technique using quantum key distribution." In 2017 4th International Conference on Networking, Systems and Security (NSysS). IEEE, 2017. http://dx.doi.org/10.1109/nsyss2.2017.8267797.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Xinlin, and Weifeng Luo. "Design and Implementation of Data Security Transmission System Based on SSL." In ICISCAE 2021: 2021 IEEE 4th International Conference on Information Systems and Computer Aided Education. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3482632.3487465.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Qi, Huifeng Liu, Xi Wang, WanJun Li, Guobin Yang, Baletabieke Bahedaer, Long Yan, et al. "The Research on Decommissioning and Abandonment Engineering Practice of Onshore Oilfield: A Case Study of Block 1/2/4 in South Sudan." In SPE Symposium: Decommissioning and Abandonment. SPE, 2021. http://dx.doi.org/10.2118/208494-ms.

Full text
Abstract:
Abstract At the end of the lifespan of this onshore oilfield development, all wells and oil production system, transmission pipelines and all surface infrastructures shall be decommissioned in accordance with international guidelines for abandonment of oil and gas facilities. The development and production period relevant to Block 1/2/4 shall be ceased in 2033 as the PSC law approved by South Sudan Government. Considering that South Sudan is located along the Nile River in Africa, necessary measures shall be taken with respect to activities in the field to ensure effective protection for the environment. In addition, difficulties which have negative impact on decommission assessment shall be taken into account, such as inadequate wells data, the destruction of the facility by war, high security risks of Block 1/2/4, costly decommissioning and abandonment fees and so on. This paper combines the practice of Block 1/2/4 in South Sudan to introduce the decommissioning plan, abandonment working process, standard operation procedure for wells and surface facility disposal, and the calculation of the decommissioning fund. The decommissioning may include complete removal or abandonment in-situ which based on an evaluation of cost, safety and environmental impact. While a detailed decommissioning and abandonment proposal has been compiled and updated during the production phase of the project. When the final decommissioning and abandonment plans have been developed for upstream and midstream, the costs have been updated accordingly. These estimates had utilized by the operators to fund the decommissioning and abandonment obligations in accordance with the provisions of the oil company. The D&A task was successful and finally approved by the authority of government. Due to the successful completion of the decommissioning task of Block1/2/4, a completed decommissioning and abandonment management system has been established, including D&A cost calculation and standard operation procedure for wells and facility disposal, which can lower the environmental risk and reduce the capital expenditure at the end of the project. It can be regarded as a classic practice in petroleum industry and has a strong reference value.
APA, Harvard, Vancouver, ISO, and other styles
10

Jia, Liu, Qingqin Fu, Zhengquan Ang, Qian Zhang, Ling Yi, Tingzheng Feng, Xuesong Bai, and Yuejie Shi. "A Chip Data Security Transmission Method based on Command Control Word Mode." In 2019 2nd International Conference on Information Systems and Computer Aided Education (ICISCAE). IEEE, 2019. http://dx.doi.org/10.1109/iciscae48440.2019.221622.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Data transmission systems Security measures"

1

Matenga, Chrispin, and Munguzwe Hichaambwa. A Multi-Phase Assessment of the Effects of COVID-19 on Food Systems and Rural Livelihoods in Zambia. Institute of Development Studies (IDS), December 2021. http://dx.doi.org/10.19088/apra.2021.039.

Full text
Abstract:
COVID-19 was declared a pandemic by the World Health Organization in March 2020. The speed with which the pandemic spread geographically, and the high rate of mortality of its victims prompted many countries around the world to institute ‘lockdowns’ of various sorts to contain it. While the global concern in the early months following the emergence of COVID-19 was with health impacts, the ‘lockdown’ measures put in place by governments triggered global socioeconomic shocks as economies entered recessions due to disruption of economic activity that the ‘lockdown’ measures entailed. Data suggests that the socioeconomic shocks arising from ‘lockdowns’ have been more severe in sub-Saharan Africa countries, generating dire livelihood consequences for most citizens who depend on the informal economy for survival. In Zambia, the effects of COVID-19 combined with a severe drought, and a decline in mining activity to contribute to a downward spiral in Zambia’s economy. This report aims to gain real-time insights into how the COVID-19 crisis was unfolding in Zambia and how rural people and food and livelihood systems were responding. The study focused on documenting and understanding the differential impacts of the pandemic at the household level in terms of changes in participation in farming activities, availability of services for agricultural production, labour and employment, marketing and transport services, food and nutrition security and poverty and wellbeing.
APA, Harvard, Vancouver, ISO, and other styles
2

Beuermann, Diether, Nicolas L. Bottan, Bridget Hoffmann, Jeetendra Khadan, and Diego A. Vera-Cossio. Suriname COVID-19 Survey. Inter-American Development Bank, May 2021. http://dx.doi.org/10.18235/0003266.

Full text
Abstract:
This dataset constitutes a panel follow-up to the 2016/2017 Suriname Survey of Living Conditions. It measures welfare related variables before and after the onset of the COVID-19 pandemic including labor market outcomes, financial literacy, and food security. The survey was executed in August 2020. The Suriname COVID-19 Survey is a project of the Inter-American Development Bank (IDB). It collected data on critical socioeconomic topics in the context of the COVID-19 pandemic to support policymaking and help mitigate the crisis impacts on the populations welfare. The survey recontacted households interviewed in 2016/2017 by the Suriname Survey of Living Conditions (SSLC) and was conducted by phone due to the mobility restrictions and social distancing measures in place. It interviewed 1,016 households during August 2020 and gathered information about disease transmission, household finances, labor, income, remittances, spending, and social protection programs. Data and documentation of the 2016/2017 Suriname Survey of Living Conditions can be found at: https://publications.iadb.org/en/suriname-survey-living-conditions-2016-2017 The survey was designed and implemented by Sistemas Integrales. This publication describes the main methodological aspects, such as sample design, estimation procedures, topics covered by the questionnaire, field organization and quality control. It also presents the structure and codebook for the two resulting publicly available datasets.
APA, Harvard, Vancouver, ISO, and other styles
3

Daudelin, Francois, Lina Taing, Lucy Chen, Claudia Abreu Lopes, Adeniyi Francis Fagbamigbe, and Hamid Mehmood. Mapping WASH-related disease risk: A review of risk concepts and methods. United Nations University Institute for Water, Environment and Health, December 2021. http://dx.doi.org/10.53328/uxuo4751.

Full text
Abstract:
The report provides a review of how risk is conceived of, modelled, and mapped in studies of infectious water, sanitation, and hygiene (WASH) related diseases. It focuses on spatial epidemiology of cholera, malaria and dengue to offer recommendations for the field of WASH-related disease risk mapping. The report notes a lack of consensus on the definition of disease risk in the literature, which limits the interpretability of the resulting analyses and could affect the quality of the design and direction of public health interventions. In addition, existing risk frameworks that consider disease incidence separately from community vulnerability have conceptual overlap in their components and conflate the probability and severity of disease risk into a single component. The report identifies four methods used to develop risk maps, i) observational, ii) index-based, iii) associative modelling and iv) mechanistic modelling. Observational methods are limited by a lack of historical data sets and their assumption that historical outcomes are representative of current and future risks. The more general index-based methods offer a highly flexible approach based on observed and modelled risks and can be used for partially qualitative or difficult-to-measure indicators, such as socioeconomic vulnerability. For multidimensional risk measures, indices representing different dimensions can be aggregated to form a composite index or be considered jointly without aggregation. The latter approach can distinguish between different types of disease risk such as outbreaks of high frequency/low intensity and low frequency/high intensity. Associative models, including machine learning and artificial intelligence (AI), are commonly used to measure current risk, future risk (short-term for early warning systems) or risk in areas with low data availability, but concerns about bias, privacy, trust, and accountability in algorithms can limit their application. In addition, they typically do not account for gender and demographic variables that allow risk analyses for different vulnerable groups. As an alternative, mechanistic models can be used for similar purposes as well as to create spatial measures of disease transmission efficiency or to model risk outcomes from hypothetical scenarios. Mechanistic models, however, are limited by their inability to capture locally specific transmission dynamics. The report recommends that future WASH-related disease risk mapping research: - Conceptualise risk as a function of the probability and severity of a disease risk event. Probability and severity can be disaggregated into sub-components. For outbreak-prone diseases, probability can be represented by a likelihood component while severity can be disaggregated into transmission and sensitivity sub-components, where sensitivity represents factors affecting health and socioeconomic outcomes of infection. -Employ jointly considered unaggregated indices to map multidimensional risk. Individual indices representing multiple dimensions of risk should be developed using a range of methods to take advantage of their relative strengths. -Develop and apply collaborative approaches with public health officials, development organizations and relevant stakeholders to identify appropriate interventions and priority levels for different types of risk, while ensuring the needs and values of users are met in an ethical and socially responsible manner. -Enhance identification of vulnerable populations by further disaggregating risk estimates and accounting for demographic and behavioural variables and using novel data sources such as big data and citizen science. This review is the first to focus solely on WASH-related disease risk mapping and modelling. The recommendations can be used as a guide for developing spatial epidemiology models in tandem with public health officials and to help detect and develop tailored responses to WASH-related disease outbreaks that meet the needs of vulnerable populations. The report’s main target audience is modellers, public health authorities and partners responsible for co-designing and implementing multi-sectoral health interventions, with a particular emphasis on facilitating the integration of health and WASH services delivery contributing to Sustainable Development Goals (SDG) 3 (good health and well-being) and 6 (clean water and sanitation).
APA, Harvard, Vancouver, ISO, and other styles
4

Data Encryption Standard. Gaithersburg, MD: National Institute of Standards and Technology, 1988. http://dx.doi.org/10.6028/nist.fips.46-1.

Full text
Abstract:
The selective application of technological and related procedural safeguards is an important responsibility of every Federal organization in providing adequate security to its ADP systems. This publication provides a standard to be used by Federal organizations when these organizations specify that cryptographic protection ia to be used for 11emitive or valuable computer data. Protection of computer data during transmission between electronic components or while in storage may be necessary to maintain the confidentiality and integrity of the Information represented by that data. The standard specifies an encryption algorithm which is to be implemented in an el.ectronJc device for use in Federal ADP systems and networks. The algorithm uniquely defines the mathematical steps required to transform computer data into a cryptographic cipher. It also specifies the steps required to transform the cipher back to its original form. A device performing this algorithm may be used in many applications areas where cryptographic data protection is needed. Within the context of a total security program comprising physical security procedures, good information management practices and computer system/network access controls, the Data Encryption Standard is being made available for use by Federal agencies. This revision supersedes FIPS 46.
APA, Harvard, Vancouver, ISO, and other styles
5

Payment Systems Report - June of 2021. Banco de la República, February 2022. http://dx.doi.org/10.32468/rept-sist-pag.eng.2021.

Full text
Abstract:
Banco de la República provides a comprehensive overview of Colombia’s finan¬cial infrastructure in its Payment Systems Report, which is an important product of the work it does to oversee that infrastructure. The figures published in this edition of the report are for the year 2020, a pandemic period in which the con¬tainment measures designed and adopted to alleviate the strain on the health system led to a sharp reduction in economic activity and consumption in Colom¬bia, as was the case in most countries. At the start of the pandemic, the Board of Directors of Banco de la República adopted decisions that were necessary to supply the market with ample liquid¬ity in pesos and US dollars to guarantee market stability, protect the payment system and preserve the supply of credit. The pronounced growth in mone¬tary aggregates reflected an increased preference for liquidity, which Banco de la República addressed at the right time. These decisions were implemented through operations that were cleared and settled via the financial infrastructure. The second section of this report, following the introduction, offers an analysis of how the various financial infrastructures in Colombia have evolved and per¬formed. One of the highlights is the large-value payment system (CUD), which registered more momentum in 2020 than during the previous year, mainly be¬cause of an increase in average daily remunerated deposits made with Banco de la República by the General Directorate of Public Credit and the National Treasury (DGCPTN), as well as more activity in the sell/buy-back market with sovereign debt. Consequently, with more activity in the CUD, the Central Securi¬ties Depository (DCV) experienced an added impetus sparked by an increase in the money market for bonds and securities placed on the primary market by the national government. The value of operations cleared and settled through the Colombian Central Counterparty (CRCC) continues to grow, propelled largely by peso/dollar non-deliverable forward (NDF) contracts. With respect to the CRCC, it is important to note this clearing house has been in charge of managing risks and clearing and settling operations in the peso/dollar spot market since the end of last year, following its merger with the Foreign Exchange Clearing House of Colombia (CCDC). Since the final quarter of 2020, the CRCC has also been re¬sponsible for clearing and settlement in the equities market, which was former¬ly done by the Colombian Stock Exchange (BVC). The third section of this report provides an all-inclusive view of payments in the market for goods and services; namely, transactions carried out by members of the public and non-financial institutions. During the pandemic, inter- and intra-bank electronic funds transfers, which originate mostly with companies, increased in both the number and value of transactions with respect to 2019. However, debit and credit card payments, which are made largely by private citizens, declined compared to 2019. The incidence of payment by check contin¬ue to drop, exhibiting quite a pronounced downward trend during the past last year. To supplement to the information on electronic funds transfers, section three includes a segment (Box 4) characterizing the population with savings and checking accounts, based on data from a survey by Banco de la República con-cerning the perception of the use of payment instruments in 2019. There also is segment (Box 2) on the growth in transactions with a mobile wallet provided by a company specialized in electronic deposits and payments (Sedpe). It shows the number of users and the value of their transactions have increased since the wallet was introduced in late 2017, particularly during the pandemic. In addition, there is a diagnosis of the effects of the pandemic on the payment patterns of the population, based on data related to the use of cash in circu¬lation, payments with electronic instruments, and consumption and consumer confidence. The conclusion is that the collapse in the consumer confidence in¬dex and the drop in private consumption led to changes in the public’s pay¬ment patterns. Credit and debit card purchases were down, while payments for goods and services through electronic funds transfers increased. These findings, coupled with the considerable increase in cash in circulation, might indicate a possible precautionary cash hoarding by individuals and more use of cash as a payment instrument. There is also a segment (in Focus 3) on the major changes introduced in regulations on the retail-value payment system in Colombia, as provided for in Decree 1692 of December 2020. The fourth section of this report refers to the important innovations and tech¬nological changes that have occurred in the retail-value payment system. Four themes are highlighted in this respect. The first is a key point in building the financial infrastructure for instant payments. It involves of the design and im¬plementation of overlay schemes, a technological development that allows the various participants in the payment chain to communicate openly. The result is a high degree of interoperability among the different payment service providers. The second topic explores developments in the international debate on central bank digital currency (CBDC). The purpose is to understand how it could impact the retail-value payment system and the use of cash if it were to be issued. The third topic is related to new forms of payment initiation, such as QR codes, bio¬metrics or near field communication (NFC) technology. These seemingly small changes can have a major impact on the user’s experience with the retail-value payment system. The fourth theme is the growth in payments via mobile tele¬phone and the internet. The report ends in section five with a review of two papers on applied research done at Banco de la República in 2020. The first analyzes the extent of the CRCC’s capital, acknowledging the relevant role this infrastructure has acquired in pro¬viding clearing and settlement services for various financial markets in Colom¬bia. The capital requirements defined for central counterparties in some jurisdic¬tions are explored, and the risks to be hedged are identified from the standpoint of the service these type of institutions offer to the market and those associated with their corporate activity. The CRCC’s capital levels are analyzed in light of what has been observed in the European Union’s regulations, and the conclusion is that the CRCC has a scheme of security rings very similar to those applied internationally and the extent of its capital exceeds what is stipulated in Colombian regulations, being sufficient to hedge other risks. The second study presents an algorithm used to identify and quantify the liquidity sources that CUD’s participants use under normal conditions to meet their daily obligations in the local financial market. This algorithm can be used as a tool to monitor intraday liquidity. Leonardo Villar Gómez Governor
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography