Journal articles on the topic 'Data transmission systems Security measures'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Data transmission systems Security measures.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Li, Feng, and Hai Ying Wang. "Designed on Information Security Systems for Mobile Databases." Advanced Materials Research 915-916 (April 2014): 1424–27. http://dx.doi.org/10.4028/www.scientific.net/amr.915-916.1424.
Full textShen, Yang. "Research on Internet Information Security in the Big Data Era." E3S Web of Conferences 218 (2020): 04008. http://dx.doi.org/10.1051/e3sconf/202021804008.
Full textKhan, Muhammad Amir, Jawad Khan, Nabila Sehito, Khalid Mahmood, Haider Ali, Inam Bari, Muhammad Arif, and Raania M. Ghoniem. "An Adaptive Enhanced Technique for Locked Target Detection and Data Transmission over Internet of Healthcare Things." Electronics 11, no. 17 (August 30, 2022): 2726. http://dx.doi.org/10.3390/electronics11172726.
Full textMallikarjuna Shastry P.M, Prasanthi Konduru,. "Huffman Coding and Multi-Generation Mixing Assisted Network Coding Based MAC for QoS-Centric Secure Data Communication over MANETs." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 5, 2021): 2146–66. http://dx.doi.org/10.17762/turcomat.v12i6.4820.
Full textStorm van Leeuwen, Daan, Ali Ahmed, Craig Watterson, and Nilufar Baghaei. "Contact Tracing: Ensuring Privacy and Security." Applied Sciences 11, no. 21 (October 25, 2021): 9977. http://dx.doi.org/10.3390/app11219977.
Full textSokolovsky, S. P. "PARAMETRIC OPTIMIZATION OF INFORMATION SYSTEMS FOR PROACTIVE PROTECTION OF DATA TRANSMISSION SERVICE FROM NETWORK RECONNAISSANCE." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 215 (May 2022): 49–57. http://dx.doi.org/10.14489/vkit.2022.05.pp.049-057.
Full textPathak, Gaurav, Jairo Gutierrez, and Saeed Ur Rehman. "Security in Low Powered Wide Area Networks: Opportunities for Software Defined Network-Supported Solutions." Electronics 9, no. 8 (July 25, 2020): 1195. http://dx.doi.org/10.3390/electronics9081195.
Full textBagul, Riya, Atharva Karaguppi, Vishwas Karale, Mudit Singal, and Dr Vaishali Ingale. "A Dynamic and Highly Configurable Crypto-Processor for brief communication interval." Journal of University of Shanghai for Science and Technology 23, no. 05 (May 25, 2021): 551–61. http://dx.doi.org/10.51201/jusst/21/05162.
Full textMartin Boros, Matej Kucera, Andrej Velas, and Jan Valouch. "Possibilities for Experimental Testing of Alarm Transmission Systems." Communications - Scientific letters of the University of Zilina 22, no. 2 (April 1, 2020): 123–28. http://dx.doi.org/10.26552/com.c.2020.2.123-128.
Full textKumari, Kimmi, and M. Mrunalini. "IoT Big Data Security, Privacy and Challenges Related to Smart Grid." International Journal of Wireless Networks and Broadband Technologies 8, no. 2 (July 2019): 1–10. http://dx.doi.org/10.4018/ijwnbt.2019070101.
Full textMaosa, Herbert, Karim Ouazzane, and Viktor Sowinski-Mydlarz. "Real-Time Cyber Analytics Data Collection Framework." International Journal of Information Security and Privacy 16, no. 1 (January 1, 2022): 1–10. http://dx.doi.org/10.4018/ijisp.311465.
Full textBurczyk, Robert, Agnieszka Czapiewska, Malgorzata Gajewska, and Slawomir Gajewski. "LTE and NB-IoT Performance Estimation Based on Indicators Measured by the Radio Module." Electronics 11, no. 18 (September 13, 2022): 2892. http://dx.doi.org/10.3390/electronics11182892.
Full textM., Vardhana, and Anil Kumar Bhat. "VLSI Implementation and Software Co-Simulation of Digital Image Watermarking with Increased Security." International Journal of Sensors, Wireless Communications and Control 10, no. 4 (December 18, 2020): 634–38. http://dx.doi.org/10.2174/2210327909666190319150314.
Full textKuchurov, Vadim, Roman Maximov, and Roman Sherstobitov. "Model and Technique for Abonent Address Masking in Cyberspace." Voprosy kiberbezopasnosti, no. 6(40) (2020): 2–13. http://dx.doi.org/10.21681/2311-3456-2020-06-2-13.
Full textLevchenko, A. O., S. H. Trutnev, N. P. Ismailova, and I. V. Sharipova. "SOFTWARE IMPLEMENTATION OF EXPERTS DATA EXCHANGE SUB-SYSTEMS IN DISTRIBUTED COMPLEXES FOR SIMULATION OF COMBAT ACTIONS." Проблеми створення, випробування, застосування та експлуатації складних інформаційних систем, no. 22 (August 4, 2022): 4–13. http://dx.doi.org/10.46972/2076-1546.2022.22.01.
Full textM, Ganavi, Prabhudeva S, and Hemanth Kumar N P. "An Efficient Image Steganography Scheme Using Bit-plane Slicing with Elliptic Curve Cryptography and Wavelet Transform." International Journal of Computer Network and Information Security 14, no. 4 (August 8, 2022): 43–59. http://dx.doi.org/10.5815/ijcnis.2022.04.04.
Full textMorozov, Ilya Leonidovich. "State Policy in the Field of Information Security on Legitimacy of the Political Structure of Modern Russia – Trends, Problems, Solutions." Общество политика экономика право, no. 9 (September 2020): 12–15. http://dx.doi.org/10.24158/pep.2020.9.1.
Full textSumathi, Appasamy, Muthuramalingam Akila, Rocío Pérez de Prado, Marcin Wozniak, and Parameshachari Divakarachari. "Dynamic Bargain Game Theory in the Internet of Things for Data Trustworthiness." Sensors 21, no. 22 (November 16, 2021): 7611. http://dx.doi.org/10.3390/s21227611.
Full textMulvaney, David, Bryan Woodward, Sekharjit Datta, Paul Harvey, Anoop Vyas, Bhaskar Thakker, Omar Farooq, and Robert Istepanian. "Monitoring Heart Disease and Diabetes with Mobile Internet Communications." International Journal of Telemedicine and Applications 2012 (2012): 1–12. http://dx.doi.org/10.1155/2012/195970.
Full textOdingo, Myron. "An Exploration of COVID-19 Management Policies across Nine African Countries." East African Health Research Journal 4, no. 2 (November 26, 2020): 113–17. http://dx.doi.org/10.24248/eahrj.v4i2.634.
Full textVatambeti, Ramesh, Nadella Sree Divya, Hanumantha Rao Jalla, and Mukkamula Venu Gopalachari. "Attack Detection Using a Lightweight Blockchain Based Elliptic Curve Digital Signature Algorithm in Cyber Systems." International Journal of Safety and Security Engineering 12, no. 6 (December 31, 2022): 745–53. http://dx.doi.org/10.18280/ijsse.120611.
Full textLukova-Chuiko, N. V., O. A. Laptev, O. V. Barabash, A. P. Musienko, and V. M. Akhramovich. "THE METHOD OF CALCULATION OF PERSONAL DATA PROTECTION ON THE BASIS OF A SET OF SPECIFIC PARAMETERS OF SOCIAL NETWORKS." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 76 (2022): 54–68. http://dx.doi.org/10.17721/2519-481x/2022/76-05.
Full textHaseeb, Khalid, Ikram Ud Din, Ahmad Almogren, and Naveed Islam. "An Energy Efficient and Secure IoT-Based WSN Framework: An Application to Smart Agriculture." Sensors 20, no. 7 (April 7, 2020): 2081. http://dx.doi.org/10.3390/s20072081.
Full textCarvajal-Gámez, Blanca Esther, and Manuel Alejandro Diaz-Casco. "Steganography Algorithm Based on the Nonlocal Maximum Likelihood Noise Estimation for Mobile Applications." Security and Communication Networks 2018 (July 26, 2018): 1–29. http://dx.doi.org/10.1155/2018/1404826.
Full textCherian, Mimi M., and Satishkumar L. Varma. "Mitigation of DDOS and MiTM Attacks using Belief Based Secure Correlation Approach in SDN-Based IoT Networks." International Journal of Computer Network and Information Security 14, no. 1 (February 8, 2021): 52–68. http://dx.doi.org/10.5815/ijcnis.2022.01.05.
Full textSingamaneni, Kranthi Kumar, Abhinav Juneja, Mohammed Abd-Elnaby, Kamal Gulati, Ketan Kotecha, and A. P. Senthil Kumar. "An Enhanced Dynamic Nonlinear Polynomial Integrity-Based QHCP-ABE Framework for Big Data Privacy and Security." Security and Communication Networks 2022 (August 10, 2022): 1–13. http://dx.doi.org/10.1155/2022/4206000.
Full textBaig, Mirza Mansoor, Hamid Gholam Hosseini, and De Han Luo. "A Secure Wireless Telehealthcare Monitoring System and its Web Application." Applied Mechanics and Materials 541-542 (March 2014): 1309–12. http://dx.doi.org/10.4028/www.scientific.net/amm.541-542.1309.
Full textXu, Wenfeng, and Yongxian Fan. "Intrusion Detection Systems Based on Logarithmic Autoencoder and XGBoost." Security and Communication Networks 2022 (April 11, 2022): 1–8. http://dx.doi.org/10.1155/2022/9068724.
Full textBaig, Mirza Jabbar Aziz, Mohammad Tariq Iqbal, Mohsin Jamil, and Jahangir Khan. "Blockchain-Based Peer-to-Peer Energy Trading System Using Open-Source Angular Framework and Hypertext Transfer Protocol." Electronics 12, no. 2 (January 5, 2023): 287. http://dx.doi.org/10.3390/electronics12020287.
Full textZhang, Jing, Qi Liu, Lu Chen, Ye Tian, and Jun Wang. "Nonintrusive Load Management Based on Distributed Edge and Secure Key Agreement." Wireless Communications and Mobile Computing 2021 (January 29, 2021): 1–13. http://dx.doi.org/10.1155/2021/6691348.
Full textWang, Xiangqing, Xiaokun Yang, Dongfei Wang, Bin Liu, Lan Zhang, Zufang Yang, Han Zhu, and Baohong Wu. "Demonstration of a Key Distribution Scheme Based on the Masking Effect of Fiber Channel Noise in Power Transmission System." Photonics 10, no. 1 (December 27, 2022): 26. http://dx.doi.org/10.3390/photonics10010026.
Full textJeong, SoonHyeong, Jun-Hong Shen, and Byeongtae Ahn. "A Study on Smart Healthcare Monitoring Using IoT Based on Blockchain." Wireless Communications and Mobile Computing 2021 (May 14, 2021): 1–9. http://dx.doi.org/10.1155/2021/9932091.
Full textLubkin, Ivan, and Vyacheslav Zolotarev. "Comprehensive Defense System against Vulnerabilities Based on Return-Oriented Programming." Informatics and Automation 21, no. 2 (November 16, 2021): 275–310. http://dx.doi.org/10.15622/ia.21.2.3.
Full textLazaar, Saiida. "A lightweight cryptographic solution to secure digital transmissions on resource-constrained environments." General Letters in Mathematics 10, no. 2 (June 2021): 38–45. http://dx.doi.org/10.31559/glm2021.10.2.4.
Full textDolha, Stelian, Paul Negirla, Florin Alexa, and Ioan Silea. "Considerations about the Signal Level Measurement in Wireless Sensor Networks for Node Position Estimation." Sensors 19, no. 19 (September 26, 2019): 4179. http://dx.doi.org/10.3390/s19194179.
Full textPutra, Shiva, H. S. Sheshadri, and V. Lokesha. "A Naïve Visual Cryptographic Algorithm for the Transfer of a Compressed Medical Images." International Journal of Recent Contributions from Engineering, Science & IT (iJES) 3, no. 4 (December 14, 2015): 26. http://dx.doi.org/10.3991/ijes.v3i4.5190.
Full textKariuki, Paul, Lizzy O Ofusori, Prabhakar Rontala Subramanniam, Moses Okpeku, and Maria L Goyayi. "Challenges in Contact Tracing by Mining Mobile Phone Location Data for COVID-19: Implications for Public Governance in South Africa." Interdisciplinary Journal of Information, Knowledge, and Management 16 (2021): 101–24. http://dx.doi.org/10.28945/4736.
Full textYURCHUK, Natalia. "MANAGEMENT OF INFORMATION RISKS OF THE ENTERPRISE IN THE CONDITIONS OF DIGITALIZATION." "EСONOMY. FINANСES. MANAGEMENT: Topical issues of science and practical activity", no. 1 (50) (April 28, 2020): 86–101. http://dx.doi.org/10.37128/2411-4413-2020-1-6.
Full textLionis, Antonios, Konstantinos Peppas, Hector E. Nistazakis, Andreas D. Tsigopoulos, and Keith Cohn. "Experimental Performance Analysis of an Optical Communication Channel over Maritime Environment." Electronics 9, no. 7 (July 9, 2020): 1109. http://dx.doi.org/10.3390/electronics9071109.
Full textLara, Brenda, Janey Kottler, Abigail Olsen, Andrew Best, Jessica Conkright, and Karen Larimer. "Home Monitoring Programs for Patients Testing Positive for SARS-CoV-2: An Integrative Literature Review." Applied Clinical Informatics 13, no. 01 (January 2022): 203–17. http://dx.doi.org/10.1055/s-0042-1742370.
Full textSirisha, Uddagiri, and Bolem Sai Chandana. "Privacy Preserving Image Encryption with Optimal Deep Transfer Learning Based Accident Severity Classification Model." Sensors 23, no. 1 (January 3, 2023): 519. http://dx.doi.org/10.3390/s23010519.
Full textBae, Dongryeoul, Kwang-Young Song, Donah Mary Macoy, Min Gab Kim, Chul-Kyu Lee, and Yu-Seong Kim. "Inactivation of Airborne Avian Pathogenic E. coli (APEC) via Application of a Novel High-Pressure Spraying System." Microorganisms 10, no. 11 (November 7, 2022): 2201. http://dx.doi.org/10.3390/microorganisms10112201.
Full textRajesh Kumar Dhanaraj, Rajesh Kumar Dhanaraj, Seifedine Kadry Rajesh Kumar Dhanaraj, Byeong-Gwon Kang Seifedine Kadry, and Yunyoung Nam Byeong-Gwon Kang. "Probit Cryptographic Blockchain for Secure Data Transmission in Intelligent Transportation Systems." 網際網路技術學刊 23, no. 6 (November 2022): 1303–13. http://dx.doi.org/10.53106/160792642022112306013.
Full textGyimah, Seth Adjei. "Security During Transmission Of Data Using Web Steganography." Advances in Multidisciplinary and scientific Research Journal Publication 34 (December 30, 2022): 37–42. http://dx.doi.org/10.22624/aims/accrabespoke2022/v34p3.
Full textPiedrahita Castillo, Diego, Francisco Machío Regidor, Javier Bermejo Higuera, Juan Ramón Bermejo Higuera, and Juan Antonio Sicilia Montalvo. "A New Mail System for Secure Data Transmission in Cyber Physical Systems." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 28, Supp02 (December 2020): 23–48. http://dx.doi.org/10.1142/s0218488520400127.
Full textDang, Chinh Manh, Vinh Quang Thai, Minh Ngoc Pham, Trung Thanh Dang, Mai Thanh Thi Phung, and Tan Duy Ngo. "The solution of data transmission security for Gateway IoT." Journal of Mining and Earth Sciences 61, no. 2 (April 29, 2020): 58–67. http://dx.doi.org/10.46326/jmes.2020.61(2).07.
Full textZenevich, A. O., E. V. Novikov, T. A. Matkovskaia, and A. A. Lagutik. "Method for Ensuring Information Security of Object Fiber-Optical Data Transmission System." Doklady BGUIR 20, no. 2 (April 5, 2022): 86–93. http://dx.doi.org/10.35596/1729-7648-2022-20-2-86-93.
Full textXu, Xian Cheng. "Design Considerations for Reliable Data Transmission and Network Separation." Applied Mechanics and Materials 738-739 (March 2015): 1146–49. http://dx.doi.org/10.4028/www.scientific.net/amm.738-739.1146.
Full textChountasis, Spiros. "Communication Challenges for Electric Power Transmission Systems." International Journal of Engineering and Technologies 21 (October 25, 2021): 1–15. http://dx.doi.org/10.18052/www.scipress.com/ijet.21.1.
Full textChountasis, Spiros. "Communication Challenges for Electric Power Transmission Systems." International Journal of Engineering and Technologies 21 (October 25, 2021): 1–15. http://dx.doi.org/10.56431/p-5ayzg2.
Full text