To see the other types of publications on this topic, follow the link: Security Thread.

Journal articles on the topic 'Security Thread'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security Thread.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sun, Fu. "Analysis of the Screw Thread Connection Strength Based on Nonlinear Finite Element Method." Applied Mechanics and Materials 401-403 (September 2013): 55–58. http://dx.doi.org/10.4028/www.scientific.net/amm.401-403.55.

Full text
Abstract:
Some parts of the projectile is in screw connection, the stress and deformation caused by screw threads are important indexes of the security, and therefore stress distribution of the connection of thread must be accurately calculated. According to the structural characteristics of threaded connection, nonlinear finite element contact analysis was used, strength of the thread connection part was simulated and analyzed by applying effective loads, and this algorithm was validated.
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Meidi, Haoyun Liu, Pan Huang, and Zhe Wu. "Penetrating Imaging of Concealed Features in Banknotes with Near-Field Scanning Microwave Microscopy." Electronics 13, no. 23 (2024): 4729. http://dx.doi.org/10.3390/electronics13234729.

Full text
Abstract:
Traditional anti-counterfeiting techniques and methods are inadequate to meet the modern, sophisticated anti-counterfeiting requirement in banknotes. We applied our homemade near-field scanning microwave microscopy (NSMM) for penetrating imaging of concealed anti-counterfeiting features in banknotes. This NSMM imaged and characterized several vital concealed anti-counterfeiting features in the banknotes, including the dynamic color-shifting security threads, color-changing denomination numbers, magnetically embedded security threads, and white watermarks. At the same time, with the obstruction
APA, Harvard, Vancouver, ISO, and other styles
3

Spahiu, VILMA. "Evaluation of Security Issuse. New Threats Twoards National and International Security." European Journal of Interdisciplinary Studies 1, no. 2 (2015): 62. http://dx.doi.org/10.26417/ejis.v1i2.p62-67.

Full text
Abstract:
The national and international security of states, nowadays, is threatened by many elements or factors, like environmental issues, the spread of mass destruction weapons, wars or ethnic conflicts in developing countries, organized crime, illegal trafficking and the corruption as a side effect of globalization. All these issues are considered as challenges that all the countries must cope with through the drafting of applicable and effective national and global security policies. The aim of this paper is the evaluation of security environment, setting forth various views over new threats or ris
APA, Harvard, Vancouver, ISO, and other styles
4

Spahiu, VILMA. "Evaluation of Security Issuse. New Threats Twoards National and International Security." European Journal of Interdisciplinary Studies 2, no. 1 (2015): 62. http://dx.doi.org/10.26417/ejis.v2i1.p62-67.

Full text
Abstract:
The national and international security of states, nowadays, is threatened by many elements or factors, like environmental issues, the spread of mass destruction weapons, wars or ethnic conflicts in developing countries, organized crime, illegal trafficking and the corruption as a side effect of globalization. All these issues are considered as challenges that all the countries must cope with through the drafting of applicable and effective national and global security policies. The aim of this paper is the evaluation of security environment, setting forth various views over new threats or ris
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Jian, Dong Sheng Fan, Yue Wu, Guo Jiang Fu, and Mei Ju Liu. "Study of Remote Elevator Monitoring Fault Detection System." Advanced Materials Research 499 (April 2012): 459–63. http://dx.doi.org/10.4028/www.scientific.net/amr.499.459.

Full text
Abstract:
Remote Elevator Monitoring (REM) is an important means to ensure elevator secure, reliable working. In this paper, an elevator remote monitoring control scheme is proposed based on multi-threaded technology. Due to all threads in the multi-threaded technology may visit the same overall situation object and the shared resource, center system communicates with embedded terminal is achieved by the method. The remote elevator monitoring system has been designed based on the multi-threaded technology; the main thread interface function is realized by monitor center software, other management operat
APA, Harvard, Vancouver, ISO, and other styles
6

Zou, Changwei, Xudong Wang, Yaoqing Gao, and Jingling Xue. "Buddy Stacks: Protecting Return Addresses with Efficient Thread-Local Storage and Runtime Re-Randomization." ACM Transactions on Software Engineering and Methodology 31, no. 2 (2022): 1–37. http://dx.doi.org/10.1145/3494516.

Full text
Abstract:
Shadow stacks play an important role in protecting return addresses to mitigate ROP attacks. Parallel shadow stacks, which shadow the call stack of each thread at the same constant offset for all threads, are known not to support multi-threading well. On the other hand, compact shadow stacks must maintain a separate shadow stack pointer in thread-local storage (TLS) , which can be implemented in terms of a register or the per-thread Thread-Control-Block (TCB) , suffering from poor compatibility in the former or high performance overhead in the latter. In addition, shadow stacks are vulnerable
APA, Harvard, Vancouver, ISO, and other styles
7

Et. al., Pavithra G,. "A Novel Watermarking and Re-Encryption Approach to Avoid Illegal Content Sharing In Cloud." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 2603–9. http://dx.doi.org/10.17762/turcomat.v12i2.2229.

Full text
Abstract:
Cloud computing is a set of information stored in a cloud, it can be accessed by the user whenever there is a need to access. Cloud computing is a combination of large interconnected computers. Importance of clod computing are storage and processing power to run application. Information can be access from anywhere .Data management is also one importance of the cloud computing. It improves performance. And also a lower infrastructure cost. Lower bandwidth does not support. Another important disadvantage is security thread. Cloud computing requires a constant internet connection. By using waterm
APA, Harvard, Vancouver, ISO, and other styles
8

Bui, Phuc, Minh Le, Binh Hoang, Nguyen Ngoc, and Huong Pham. "Data Partitioning and Asynchronous Processing to Improve the Embedded Software Performance on Multicore Processors." Informatics and Automation 21, no. 2 (2022): 243–74. http://dx.doi.org/10.15622/ia.21.2.2.

Full text
Abstract:
Nowadays, ensuring information security is extremely inevitable and urgent. We are also witnessing the strong development of embedded systems, IoT. As a result, research to ensure information security for embedded software is being focused. However, studies on optimizing embedded software on multi-core processors to ensure information security and increase the performance of embedded software have not received much attention. The paper proposes and develops the embedded software performance improvement method on multi-core processors based on data partitioning and asynchronous processing. Data
APA, Harvard, Vancouver, ISO, and other styles
9

Priambodo, Agung. "PERSIMPANGAN DILEMA PENANGANAN PENGUNGSI ASING DI INDONESIA PASCA PENERBITAN PERPRES NO. 125 TAHUN 2016." Cakrawala - Jurnal Humaniora 21, no. 2 (2021): 122–29. http://dx.doi.org/10.31294/jc.v21i2.10995.

Full text
Abstract:
This article aims to unravel the issues of the threat of waves of refugees and asylum seekers in Indonesia. The concept of non-traditional security is adopted in this study as a framework for analyzing social problems of refugees and asylum seekers that have an impact on national security and interests. This research uses descriptive-qualitative analysis method to draw a common thread of threats that may arise along with the implementation of Presidential Decree no. 125 of 2016 concerning Handling of Refugees from Overseas. Referring to the results of data analysis, this study draws four reaso
APA, Harvard, Vancouver, ISO, and other styles
10

Woody, Carol. "Mission Thread Security Analysis: A Tool for Systems Engineers to Characterize Operational Security behavior." INSIGHT 16, no. 2 (2013): 37–40. http://dx.doi.org/10.1002/inst.201316237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Eilers, Marco, Thibault Dardinier, and Peter Müller. "CommCSL: Proving Information Flow Security for Concurrent Programs using Abstract Commutativity." Proceedings of the ACM on Programming Languages 7, PLDI (2023): 1682–707. http://dx.doi.org/10.1145/3591289.

Full text
Abstract:
Information flow security ensures that the secret data manipulated by a program does not influence its observable output. Proving information flow security is especially challenging for concurrent programs, where operations on secret data may influence the execution time of a thread and, thereby, the interleaving between different threads. Such internal timing channels may affect the observable outcome of a program even if an attacker does not observe execution times. Existing verification techniques for information flow security in concurrent programs attempt to prove that secret data does no
APA, Harvard, Vancouver, ISO, and other styles
12

Manasa, R., and Jayanthila Devi A. "Cyber Security Attacks Detecting Thread in the Virtual World of Corporate Sectors." International Journal of Case Studies in Business, IT, and Education (IJCSBE) 7, no. 2 (2023): 90–105. https://doi.org/10.5281/zenodo.7818522.

Full text
Abstract:
<strong>Purpose: </strong><em>Attempting to get access to a computer, computer network, or computing system without authorization is known as a cyber-attack. To modify, impede, erase, manipulate or steal data from computer systems is the purpose of a cyber-attack. These attacks may be carried out in a number of ways. This placeholder information is used to identify a single instance of the use of a prgramme that may support numerous users at once. A thread is an information that a programme requires to serve a single user or a single service request. Cybercriminals make use of technology to do
APA, Harvard, Vancouver, ISO, and other styles
13

Bhatti, David Samuel, Salbia Sidrat, Shahzad Saleem, et al. "Performance analysis: Securing SIP on multi-threaded/multi-core proxy server using public keys on Diffie–Hellman (DH) in single and multi-server queuing scenarios." PLOS ONE 19, no. 1 (2024): e0293626. http://dx.doi.org/10.1371/journal.pone.0293626.

Full text
Abstract:
The rapid replacement of PSTN with VOIP networks indicates the definitive phase-out of the PBX/PABX with smartphone-based VOIP technology that uses WLAN connectivity for local communication; however, security remains a key issue, regardless of the communication coverage area. Session initiation protocol (SIP) is one of the most widely adopted VOIP connection establishment protocols but requires added security. On the Internet, different security protocols, such as HTTPS (SSL/TLS), IPSec, and S/MIME, are used to protect SIP communication. These protocols require sophisticated infrastructure and
APA, Harvard, Vancouver, ISO, and other styles
14

Sumaira Hassan, Muhammad Shafiullah, Ali Ahmed, and Fahim Muhammad Khan. "Advances in AI to Predict and Prevent Cyber Security Attacks: A Comprehensive Analysis of Modern World." Physical Education, Health and Social Sciences 3, no. 1 (2025): 47–55. https://doi.org/10.63163/jpehss.v3i1.209.

Full text
Abstract:
The following research paper emphasis over the importance of AI and it’s one component that is Cyber Security that has now became an essential part to address CS threats &amp; frauds and detect any more attacks while mitigating issues arises from it. The research paper discovers hidden significance of AI in cyber security that emphasize on advanced machine learning algorithms predictive analytics and automatic to enhance thread detections and response mechanisms. The global use of artificial intelligence in cyber security is not just restricted to one state but it is now becoming the essential
APA, Harvard, Vancouver, ISO, and other styles
15

Kambourakis, Georgios, Constantinos Kolias, Dimitrios Geneiatakis, Georgios Karopoulos, Georgios Michail Makrakis, and Ioannis Kounelis. "A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks." Symmetry 12, no. 4 (2020): 579. http://dx.doi.org/10.3390/sym12040579.

Full text
Abstract:
Protocol stacks specifically designed for the Internet of Things (IoT) have become commonplace. At the same time, security and privacy concerns regarding IoT technologies are also attracting significant attention given the risks that are inherently associated with the respective devices and their numerous applications, ranging from healthcare, smart homes, and cities, to intelligent transportation systems and industrial automation. Considering the still heterogeneous nature of the majority of IoT protocols, a major concern is to find common references for investigating and analyzing their secu
APA, Harvard, Vancouver, ISO, and other styles
16

Giri, Roshan, Shanker Prasad Chimouriya, and Bal Ram Ghimire. "STUDY OF SECURITY FEATURES PRESENT IN NEPALI PASSPORT." JOURNAL OF TECHNOLOGY & INNOVATION 3, no. 2 (2023): 58–63. http://dx.doi.org/10.26480/jtin.02.2023.58.63.

Full text
Abstract:
Security features present on Nepali passport are examined with the help of Video Spectral Comparator. Mainly examination is carried out with application ultra-violet light, normal light, oblique light and transmitted light. We obtain different types of security features including florescence, ghost image, binding thread, optical fiber, punched number, barcode, micro-printing, watermark, emboss etc. The main aim of this work is to provide information about security features present in Nepali passport so that concern agencies as well as general public to distinguish between genuine and fake pass
APA, Harvard, Vancouver, ISO, and other styles
17

Gharibshah, Joobin, Evangelos E. Papalexakis, and Michalis Faloutsos. "REST: A Thread Embedding Approach for Identifying and Classifying User-Specified Information in Security Forums." Proceedings of the International AAAI Conference on Web and Social Media 14 (May 26, 2020): 217–28. http://dx.doi.org/10.1609/icwsm.v14i1.7293.

Full text
Abstract:
How can we extract useful information from a security forum? We focus on identifying threads of interest to a security professional: (a) alerts of worrisome events, such as attacks, (b) offering of malicious services and products, (c) hacking information to perform malicious acts, and (d) useful security-related experiences. The analysis of security forums is in its infancy despite several promising recent works. Novel approaches are needed to address the challenges in this domain: (a) the difficulty in specifying the “topics” of interest efficiently, and (b) the unstructured and informal natu
APA, Harvard, Vancouver, ISO, and other styles
18

Li, Feng, Zhi Hua Wang, and Hu Cheng Li. "Fast Static Security Analysis of Day-Ahead Generation Scheduling 96 Period Cases Adapting to Large Power System." Advanced Materials Research 732-733 (August 2013): 669–76. http://dx.doi.org/10.4028/www.scientific.net/amr.732-733.669.

Full text
Abstract:
It’s important to improve the speed of security analysis of 96 period generation scheduling cases. Based on the characteristics of 96 period cases’ security analysis, four technical proposals were presented. They were following as fast scanning and analysis technology based on DC power flow screening, multiple thread parallel computing adapted to a multiple contingency case, multiple process parallel computing technology adapted to multiple period cases. Detailed test examples showed that the proposed methods could contribute much to fast security analysis of 96 period cases’ day-ahead dispatc
APA, Harvard, Vancouver, ISO, and other styles
19

Pang, Toh Yen, Juan D. Pelaez Restrepo, Chi-Tsun Cheng, Alim Yasin, Hailey Lim, and Miro Miletic. "Developing a Digital Twin and Digital Thread Framework for an ‘Industry 4.0’ Shipyard." Applied Sciences 11, no. 3 (2021): 1097. http://dx.doi.org/10.3390/app11031097.

Full text
Abstract:
This paper provides an overview of the current state-of-the-art digital twin and digital thread technology in industrial operations. Both are transformational technologies that have the advantage of improving the efficiency of current design and manufacturing. Digital twin is an important element of the Industry 4.0 digitalization process; however, the huge amount of data that are generated and collected by a digital twin offer challenges in handling, processing and storage. The paper aims to report on the development of a new framework that combines the digital twin and digital thread for bet
APA, Harvard, Vancouver, ISO, and other styles
20

Giri, R., P. Bhattarai, S. P. Chimouriya, and B. R. Ghimire. "Examination of Security Features in Nepali Currency of Denomination Rs. 500 and Rs. 1000 Using Video Spectral Comparator-6000." Journal of Nepal Physical Society 7, no. 4 (2021): 36–42. http://dx.doi.org/10.3126/jnphyssoc.v7i4.42929.

Full text
Abstract:
In this work, we have studied security features of Nepali currencies of denomination Rs. 500 and Rs. 1000 of recent two series with the help of Video Spectral Comparator-6000. During examination, mostly ultraviolet, normal, transmitted and oblique light are used. We found nine different security features like fluorescence, water mark, micro text, security thread, intaglio print, see through registor, emboss, optically variable ink and latent image in this work. One feature, latent image is found to be completely removed in new series of both Rs. 500 and Rs. 1000 whereas new important security
APA, Harvard, Vancouver, ISO, and other styles
21

B N, Mangalagowri, and Dr N. Sandeep Varma. "Intrusion Detection System of IPv6 Network." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (2022): 1267–74. http://dx.doi.org/10.22214/ijraset.2022.46628.

Full text
Abstract:
Abstract: There are variations within the network of the differential computing system's underlying IPv6 network. There are different blind zones for security detection. It is thoroughly investigated how the automatic data processing system differs from the underlying IPv6 network. An enhanced underlying IPv6 network security detection module design approach is suggested for the multicomputer system based on this concept. One gets the comprehensive module design plan. The new technologies like receiving thread domain, object forwarding domain, and file buffer are taken into account by the netw
APA, Harvard, Vancouver, ISO, and other styles
22

Jonev, Katarina, Ivan Rancic, and Hatidza Berisha. "CONTEMPORARY WARS AND ARMED CONFLICTS." Knowledge International Journal 26, no. 6 (2019): 1827–37. http://dx.doi.org/10.35120/kij26061827j.

Full text
Abstract:
The characteristics of contemporary trends suggest that, in parallel with the changes that globalization has caused in most aspects of human life, the changes have taken place in the reasons for the emergence of conflicts in the new environment, in the ways of solving the newly emerging problems, but also in the view of the growing confrontation in the world. Each of these associations contains asymmetry as the basic characteristic, and we declare such types of conflict as asymmetric armed conflicts or wars, or the use of armed force in response to asymmetric security threats. In most cases, s
APA, Harvard, Vancouver, ISO, and other styles
23

Zahraa Raji Al-zobaiby. "Developing data mining algorithms for predicting cyber security risks using predictive analytics." World Journal of Advanced Research and Reviews 25, no. 2 (2025): 585–92. https://doi.org/10.30574/wjarr.2025.25.2.0344.

Full text
Abstract:
Data mining methods used as one of successfully potential solution against cyber risks, big data and electronic thread increasing faster in the last year's, so it forms a challenge to cyber security, data prediction used as one of the fundamental tools to predict cyber risks and improving security methods. Cyber security is one of important popular challenges in the current era where cyber-attacks and risks increasing, so fast it is very important to develop tools and techniques of cyber security, data mining techniques one of the important method used to solve cyber security problems. In this
APA, Harvard, Vancouver, ISO, and other styles
24

Agrawal and Mankar. "Mobile Cloud Computing." International Journal of Ingenious Research, Invention and Development (IJIRID) 1, no. 2 (2023): 29–32. https://doi.org/10.5281/zenodo.7820178.

Full text
Abstract:
Mobile Cloud Computing (MCC) which combines mobile computing and cloud computing, has become one of the industry buzz words and a major discussion thread in the IT world since 2009. As MCC is still at the early stage of development, it is necessary to grasp a thorough understanding of the technology in order to point out the direction of future research. With the latter aim, this paper presents a review on the background and principle of MCC, characteristics, recent research work, and future research trends. A brief account on the background of MCC: from mobile computing to cloud computing is
APA, Harvard, Vancouver, ISO, and other styles
25

Matveev, Aleksei Aleksandrovich. "Migration security within the system of global security: mechanisms, principles, actors." Философская мысль, no. 3 (March 2021): 66–80. http://dx.doi.org/10.25136/2409-8728.2021.3.33512.

Full text
Abstract:
This article is dedicated to migration security, which is viewed within the paradigm of sustainable development and as part of the global security system. The author attempts to reveal the mechanisms and principles that define the effect of migration security upon the political and social stability of the countries in the period of migration crisis. The role actors in achieving sustainable development through the discourse of global security is determined. For solving the set tasks, the article employs comparative and systematic approaches. The key factors of the global security system are ide
APA, Harvard, Vancouver, ISO, and other styles
26

Wang, Yi-Wei, and Ja-Ling Wu. "A Privacy-Preserving Symptoms Retrieval System with the Aid of Homomorphic Encryption and Private Set Intersection Schemes." Algorithms 16, no. 5 (2023): 244. http://dx.doi.org/10.3390/a16050244.

Full text
Abstract:
This work presents an efficient and effective system allowing hospitals to share patients’ private information while ensuring that each hospital database’s medical records will not be leaked; moreover, the privacy of patients who access the data will also be protected. We assume that the thread model of the hospital’s security is semi-honest (i.e., curious but honest), and each hospital hired a trusted medical records department administrator to manage patients’ private information from other hospitals. With the help of Homomorphic Encryption- and Private Set Intersection -related algorithms,
APA, Harvard, Vancouver, ISO, and other styles
27

Geppert, Karol, and Jerzy Konieczny. "Analysis of Potential Threats to the Critical Infrastructure of the 31st Tactical Air Base, in the Context of the Security of the Poznan Agglomeration." Przegląd Strategiczny, no. 16 (January 22, 2024): 219–35. http://dx.doi.org/10.14746/ps.2023.1.16.

Full text
Abstract:
The main purpose of the article is an attempt to analyze the potential threats to the critical infrastructure of the 31st Tactical Air Base in Poznań-Krzesiny in terms of the security of the Poznań agglomeration. The main threats that may occur have been indicated in the context of military, non-military, asymmetric or hybrid activities. In addition, the mortgage effects of the actions taken, which can have a measurable impact on the safety of the Poznań agglomeration, were discussed and presented. An additional thread in the article is the indication of the existing threats that took place in
APA, Harvard, Vancouver, ISO, and other styles
28

Singh, Anshul, Aryan Shenoy, and Nihar Thanekar. "Chain Thread: Blockchain-Powered Product Verification and Authenticity Tracking." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 4976–81. https://doi.org/10.22214/ijraset.2025.69592.

Full text
Abstract:
Abstract: Fake Product Identification through Blockchain is a decentralized application (dApp) designed to combat counterfeit goods by providing a transparent, secure, and efficient product verification system. The platform integrates Blockchain technology with QR Codes and NFC (Near Field Communication) tags, ensuring product authenticity from registration to verification. The system allows manufacturers to register products on the blockchain, associating each product with a unique identifier (serial number) linked to a QR code or NFC tag. Sellers and consumers can then scan the product's cod
APA, Harvard, Vancouver, ISO, and other styles
29

Anderson, Ross, and Tyler Moore. "Information security: where computer science, economics and psychology meet." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 367, no. 1898 (2009): 2717–27. http://dx.doi.org/10.1098/rsta.2009.0027.

Full text
Abstract:
Until ca. 2000, information security was seen as a technological discipline, based on computer science but with mathematics helping in the design of ciphers and protocols. That perspective started to change as researchers and practitioners realized the importance of economics. As distributed systems are increasingly composed of machines that belong to principals with divergent interests, incentives are becoming as important to dependability as technical design. A thriving new field of information security economics provides valuable insights not just into ‘security’ topics such as privacy, bug
APA, Harvard, Vancouver, ISO, and other styles
30

Mr., Rajeev &. Mr. Dhirender. "A SURVEY OF URBAN PEOPLE AWARENESS ABOUT NEW INDIAN CURRENCY SECURITY FEATURES AFTER DEMONETIZATION." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 7 (2017): 563–67. https://doi.org/10.5281/zenodo.829771.

Full text
Abstract:
Use of currency notes is increasing year by year and so does risk of its holders.It has become need of hour for every country to make its currency difficult to counterfeit.Security features and security printing are the only solution for this problem.Security features not only prevent duplicacyof notes but also save the poor citizens from possible financial loss.This survey work was carried out to understand the awareness level about security features in new currency notes because relevancy of such work has increased by manifold in recent era after demonetization.
APA, Harvard, Vancouver, ISO, and other styles
31

Zhang, Rui Xia, Ya Liang Wang, and Yan Lan Liu. "Research on File System Event Monitoring in Android Platform." Applied Mechanics and Materials 443 (October 2013): 494–98. http://dx.doi.org/10.4028/www.scientific.net/amm.443.494.

Full text
Abstract:
Android is a standard and popular platform of various smart phone. Security thread is a major problem to smart phone. File system event monitoring is essential for many types of programs ranging from file managers to security tools. In this paper, we make research on file system event monitoring. Our approach involves file nodes monitor by Android API and Linux native system call. We compare different features between them. It shows that each method has its benefit and limitation. Linux system calls method outperforms API in flexibility and scalability. But it has its un-convenience to user fo
APA, Harvard, Vancouver, ISO, and other styles
32

Paul Okudolo, Ikemefuna Taire, and Itumeleng Mekoa. "Recurring thread in local administration and its impact on human security in Africa : experience from Nigeria." African Renaissance SI, no. 3 (2019): 57–74. http://dx.doi.org/10.31920/2516-5305/2019/sin3a4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Liu, Yu, Zhibo Pang, Gyorgy Dan, Dapeng Lan, and Shaofang Gong. "A Taxonomy for the Security Assessment of IP-Based Building Automation Systems: The Case of Thread." IEEE Transactions on Industrial Informatics 14, no. 9 (2018): 4113–23. http://dx.doi.org/10.1109/tii.2018.2844955.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Collins, Rob, Peter Pearson, and Peter Chattaway. "3.4.2 Improving Systems Integrity by Using Thread Analysis for Design Validation." INCOSE International Symposium 10, no. 1 (2000): 446–54. http://dx.doi.org/10.1002/j.2334-5837.2000.tb00410.x.

Full text
Abstract:
AbstractThe techniques described in this paper have been developed and applied on a series of major systems engineering projects, most recently including the BOWMAN programme. BOWMAN will encompass the design, development, manufacture, conversion (rollout) and support of the new communications systems for the British Army. The BOWMAN contract will be valued in excess of £1.5 Billion and be delivered and installed over a period of 6 years.Thread Analysis is a technique that enables systems design to be systematically inspected with respect to a number of desirable properties. Threads analysis f
APA, Harvard, Vancouver, ISO, and other styles
35

Chandra, G. Rajesh, K. Jagan Mohan, Osamah Ibrahim Khalaf, et al. "A superior secure key spawn using boosted uniqueness encryption for cloud computing in advanced extensive mobile network." SINERGI 28, no. 2 (2024): 405. http://dx.doi.org/10.22441/sinergi.2024.2.019.

Full text
Abstract:
The cloud computing sector, including mobile networks has increased in the present time. Because of advanced features and security related information in cloud. So many methods are available for handling these problems. Cloud security, large number of methods existing for provide security. Among that, so many widespread techniques cast-off to protected data in cloud based on Individuality based encryption. This method specialty is allowing only authorized end users for access legal data and avoid smalevolent attack. Individuality -based encryption method follows up the four stages like Name, K
APA, Harvard, Vancouver, ISO, and other styles
36

Flynn, Christopher, and Emily Tsokos. "Energy security, moratoria and domestic gas: Australia, LNG and its gas policy catch-22." APPEA Journal 57, no. 1 (2017): 26. http://dx.doi.org/10.1071/aj16232.

Full text
Abstract:
In a region undergoing rapid and profound geopolitical change, energy security will be more important than ever. As a key regional energy producer, Australia will play a fundamental role in the energy security of its major trading partners. However, ironically, it also faces energy security challenges of its own. Over the next 12months, as Australia becomes the world’s largest producer of liquefied natural gas (LNG), its own domestic gas demand will also continue to grow. At the same time, one or more of our LNG facilities is expected to start to face significant upstream gas supply constraint
APA, Harvard, Vancouver, ISO, and other styles
37

Brooks, Mitchell, and Matthew Hause. "Model‐Based Cyber Security at the Enterprise and Systems Level." INCOSE International Symposium 33, no. 1 (2023): 649–65. http://dx.doi.org/10.1002/iis2.13044.

Full text
Abstract:
AbstractModel‐Based Engineering (MBE) has transformed the worlds of mechanical, electrical, chemical, software, systems engineering, and now cybersecurity. Model based cybersecurity allows this concern to be addressed as an integrated part of the solution as opposed to being a separate solution. To best take advantage of this, we must examine which modeling practices, languages, and standards are best suited to handle cybersecurity. Currently, UAF is the most effective tool being used to provide Model‐Based Cyber Security at the Enterprise and Systems Level. It achieves this largely through it
APA, Harvard, Vancouver, ISO, and other styles
38

Wang, Wen Cai, Wen Bin Wei, and Ling Wang. "Numerical Simulation Study on Combined Supporting Scheme of Bolts and Anchor Cable." Applied Mechanics and Materials 638-640 (September 2014): 898–903. http://dx.doi.org/10.4028/www.scientific.net/amm.638-640.898.

Full text
Abstract:
Aiming at the face roadway 22109 of Cuncaota coal mine, using FLAC3Dnumerical simulation software, 19 of 5 groups about bolt and anchor combined support schemes were analysed and compared, and the reasonable scheme of φ18×2000mm thread steel bolt and φ17.8×6500mm anchor cable combined support was obtained. Support result of this scheme was analysed with FLAC3Dsoftware, the result show that this scheme can support the roadway effectively. Practical application show that this scheme can achieve the security, economical and effective support result, and can be used in this type of roadway.
APA, Harvard, Vancouver, ISO, and other styles
39

Sandhya, P. K*1 &. Prof. K. S. Valsaraj2. "SURVEY ON SMART HOME TECHNOLOGIES TO UNDERSTAND ITS SCALING ISSUES." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Metanoia 19 (April 5, 2019): 59–62. https://doi.org/10.5281/zenodo.2630850.

Full text
Abstract:
A perfect smart home technology is like an interface between humans and systems. It can detect the human feelings and situations. Then it automatically control the home appliances according to their needs. Home appliances can use various type of technologies for communication. In this paper characteristics of different wireless communication techniques like Wi-Fi, ZigBee, Bluetooth, EnOcean, Z-Wave, WiMax, Thread and GSM are studied and their working principles are compared with each other. From this users can choose their own choice of technologies. In SH-IoT the key requirements are channel
APA, Harvard, Vancouver, ISO, and other styles
40

Xia, Zhixin, Xiaolei Yang, Afei Li, Yongshan Liu, and Siyuan He. "Research on Information Security Transmission of Port Multi-Thread Equipment Based on Advanced Encryption Standard and Preprocessing Optimization." Applied Sciences 14, no. 24 (2024): 11887. https://doi.org/10.3390/app142411887.

Full text
Abstract:
Based on the C/S multithreaded control framework, this article used AES encryption technology, and by customizing the S-boxes therein and differential diffusion of the S-boxes, it improved the randomness of the ciphertexts and the resistance to differential attacks, and reduced the likelihood of leakage in the process of data computation. On this basis, in order to reduce the cost overhead generated by AES encryption, this paper used the pre-computed method of optimizing S-boxes and Mixcolumn matrices to be applied to the multithreaded control framework, which improved the computation rate of
APA, Harvard, Vancouver, ISO, and other styles
41

Maj, Ewa. "Suwerenność w myśli politycznej współczesnego ruchu narodowego w Polsce." Myśl Polityczna. Political Thought 2(22) (2024): 31–54. https://doi.org/10.31268/mppt.2024.14.

Full text
Abstract:
The contemporary national movement in Poland is characterised by a wide range of ideological and structural diversity. Its political thought presents a complex mosaic of issues vital to the nation and the state. The various ideological currents include national-Catholic, national-conservative, national-liberal, national-radical, and Slavic perspectives. A common thread among these movements is the identification of sovereignty with the welfare of the Polish nation. This article examines political sovereignty within the context of Poland’s political system and its internal and external security
APA, Harvard, Vancouver, ISO, and other styles
42

Nuriev, Marat, Rimma Zaripova, Sergey Sitnikov, and Rustam Nurgaliev. "The principles of building a parallel program for steganographic file protection." E3S Web of Conferences 458 (2023): 09027. http://dx.doi.org/10.1051/e3sconf/202345809027.

Full text
Abstract:
In the modern era, the unprecedented growth of data and its consequential demands on transmission and storage systems have highlighted the necessity for efficient and secure information processing mechanisms. This paper delves into the potential of steganography as a robust tool for ensuring confidentiality by embedding data covertly within other files. Recognizing the limitations of traditional steganographic techniques in the face of expansive contemporary data sets, the paper explores the amalgamation of parallel programming with steganographic processes. Such a fusion promises to distribut
APA, Harvard, Vancouver, ISO, and other styles
43

Li, Hui. "Computer Security Issues and Legal System Based on Cloud Computing." Computational Intelligence and Neuroscience 2022 (July 11, 2022): 1–11. http://dx.doi.org/10.1155/2022/8112212.

Full text
Abstract:
To effectively improve the security and accuracy of computer information storage, a computer security problem and legal system based on cloud computing are proposed. Firstly, this article details the evolution of cloud computing, its characteristics, architecture, and application status of cloud computing in detail. Second, we discussed security strategies to ensure the confidentiality and integrity of cloud computing information, focuses on the data encryption technology of cloud data security, and designs and implements the data backup and recovery system based on the cloud platform. The cor
APA, Harvard, Vancouver, ISO, and other styles
44

Chen, Wei Bing, Gang Lin Zhang, and Lu Feng. "Realization and Design of Mobile Video Surveillance Client Platform Based on Smart Phone." Applied Mechanics and Materials 602-605 (August 2014): 1753–56. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.1753.

Full text
Abstract:
To realize video surveillance at any time and any place, a kind of video surveillance platform based on 3G smart phone was designed. In this paper, the general design scheme of video surveillance system was firstly introduced. Then, the surveillance software development method of smart phone client, the transmission mode and transmission protocol of surveillance video were also emphatically described. This system used SVAC which is kind of specifying surveillance video to meet security-monitoring demand. It used multi-image display to realized multi-channel video surveillance, and also used mu
APA, Harvard, Vancouver, ISO, and other styles
45

Xiong, Qi, Xiao Feng He, and Jie Tang. "Design and Implementation of Authentication Server with High Concurrency." Advanced Materials Research 834-836 (October 2013): 1791–94. http://dx.doi.org/10.4028/www.scientific.net/amr.834-836.1791.

Full text
Abstract:
With increasing problems of network security, a server with high concurrency is designed here to deal with identity authentication. In the general design of the server, RSA and DES algorithm are used. RSA algorithm is used to encrypt or decrypt users identity information. DES algorithm is used to ensure the information will not be stolen. In order to ensure the server has high concurrency, the technology of epoll and thread pool is applied to design the server in the Linux system. In the end , integration testing and stress testing are performed to test its reliability and stability. The testi
APA, Harvard, Vancouver, ISO, and other styles
46

Jamiluddin and Novia Yuliana. "THE IMPACT OF THREAD KELAMBU WATERFALL TOURISM ON THE SOCIO-ECONOMIC CONDITIONS OF THE PEOPLE OF AIK BERIK VILLAGE, BATUKLIANG UTARA SUB-DISTRICT CENTRAL LOMBOK DISTRICT." Proceedings of the International Conference on Social Studies Education (ICoSSE) 1, no. 1 (2024): 212–19. https://doi.org/10.20414/icosse.v1i1.23.

Full text
Abstract:
This study aims to determine the positive and negative impacts of the existence of thread kelambu waterfall tourism on the social and economic conditions of the community and the efforts of the local government in handling the negative impacts of tourism on the people of Aik Berik Village. The type of research used in this research is qualitative research using a descriptive approach, where the data will be expressed in the form of sentences and descriptions, even in the form of short stories. The data collection techniques used are observation, interviews and documentation. From the results o
APA, Harvard, Vancouver, ISO, and other styles
47

Wang, Kunpeng, Jingmei Li, Zhongchuan Fu, and Tianyu Chen. "IRePf: An Instruction Reorganization Virtual Platform for Kernel Stack Overflow Detection." Security and Communication Networks 2022 (May 13, 2022): 1–14. http://dx.doi.org/10.1155/2022/7645210.

Full text
Abstract:
Stack overflow vulnerabilities are among the most common security issues. However, the existing stack overflow detection solutions only protect the return address and ignore the imbalance between function calls and returns in the system, which will lead to a higher false-positive rate. In this paper, we propose an instruction reorganization virtual platform technique for kernel stack overflow detection, named IRePf. It can dynamically monitor the kernel stack when the system is running through dynamic reorganization instructions, thread creation and termination, call instructions, and RET inst
APA, Harvard, Vancouver, ISO, and other styles
48

Al-Refai, Hasan, and Ali Ahmad Alawneh. "User Authentication and Authorization Framework in IoT Protocols." Computers 11, no. 10 (2022): 147. http://dx.doi.org/10.3390/computers11100147.

Full text
Abstract:
The Internet of Things (IoT) has become one of the most attractive domains nowadays. It works by creating a special network between physical devices such as vehicles, home equipment, and other items. In recent days, the common technologies of communication such as Wi-Fi and 2G/3G/4G cellular networks are insufficient for IoT networks because they are designed to serve appliances with immense processing capabilities such as laptops and PCs. Moreover, most of these technologies are centralized and use an existing infrastructure. Currently, new communication technologies such as Z-Wave, 6LowPAN,
APA, Harvard, Vancouver, ISO, and other styles
49

Singhal, Prateek, Puneet Sharma, and Sheenu Rizvi. "Thwarting Sybil Attack by CAM Method in WSN using Cooja Simulator Framework." International Journal of Engineering & Technology 7, no. 4.19 (2018): 589–95. http://dx.doi.org/10.14419/ijet.v7i4.19.27965.

Full text
Abstract:
In the area of IoT Sybil attack is vulnerable where the fake identities can manipulate or misuse pseudoidentities to negotiate the successof spam and Internet of Things. The nodes illegitimately claim multiple identities against sensor and Ad-Hoc networks. The hostile or faulty remote computing elements faces the security thread on large- scale peer-to-peer systems. We have a trust agency to certify the identities prevent from the “Sybil Attack”. Multiple identities that control sustainable fraction of systems so prevent from loss of information while data exchanging via networks or intern
APA, Harvard, Vancouver, ISO, and other styles
50

Indarti, Erlyn. "Strengthen Security and Public Order: Accountability Management in Improving the Quality of Law Enforcement." Academic Journal of Interdisciplinary Studies 9, no. 2 (2020): 82. http://dx.doi.org/10.36941/ajis-2020-0025.

Full text
Abstract:
In the framework of Democratic Policing Reforms, since 1979 the United Nations has actually adopted what is called the Code of Conduct for Law Enforcement Officials. This Code of Conduct includes the idea that the police should represent and be accountable to the entire community. Within the Indonesian case, it is recognized that there is a red thread between supervision and accountability of police performance, particularly law enforcement. However, more than a decade since police reform began in Indonesia, the demands of the wider community for accountability in carrying out police duties, p
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!