Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Security Thread.

Artykuły w czasopismach na temat „Security Thread”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Security Thread”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Sun, Fu. "Analysis of the Screw Thread Connection Strength Based on Nonlinear Finite Element Method." Applied Mechanics and Materials 401-403 (September 2013): 55–58. http://dx.doi.org/10.4028/www.scientific.net/amm.401-403.55.

Pełny tekst źródła
Streszczenie:
Some parts of the projectile is in screw connection, the stress and deformation caused by screw threads are important indexes of the security, and therefore stress distribution of the connection of thread must be accurately calculated. According to the structural characteristics of threaded connection, nonlinear finite element contact analysis was used, strength of the thread connection part was simulated and analyzed by applying effective loads, and this algorithm was validated.
Style APA, Harvard, Vancouver, ISO itp.
2

Wang, Meidi, Haoyun Liu, Pan Huang, and Zhe Wu. "Penetrating Imaging of Concealed Features in Banknotes with Near-Field Scanning Microwave Microscopy." Electronics 13, no. 23 (2024): 4729. http://dx.doi.org/10.3390/electronics13234729.

Pełny tekst źródła
Streszczenie:
Traditional anti-counterfeiting techniques and methods are inadequate to meet the modern, sophisticated anti-counterfeiting requirement in banknotes. We applied our homemade near-field scanning microwave microscopy (NSMM) for penetrating imaging of concealed anti-counterfeiting features in banknotes. This NSMM imaged and characterized several vital concealed anti-counterfeiting features in the banknotes, including the dynamic color-shifting security threads, color-changing denomination numbers, magnetically embedded security threads, and white watermarks. At the same time, with the obstruction
Style APA, Harvard, Vancouver, ISO itp.
3

Spahiu, VILMA. "Evaluation of Security Issuse. New Threats Twoards National and International Security." European Journal of Interdisciplinary Studies 1, no. 2 (2015): 62. http://dx.doi.org/10.26417/ejis.v1i2.p62-67.

Pełny tekst źródła
Streszczenie:
The national and international security of states, nowadays, is threatened by many elements or factors, like environmental issues, the spread of mass destruction weapons, wars or ethnic conflicts in developing countries, organized crime, illegal trafficking and the corruption as a side effect of globalization. All these issues are considered as challenges that all the countries must cope with through the drafting of applicable and effective national and global security policies. The aim of this paper is the evaluation of security environment, setting forth various views over new threats or ris
Style APA, Harvard, Vancouver, ISO itp.
4

Spahiu, VILMA. "Evaluation of Security Issuse. New Threats Twoards National and International Security." European Journal of Interdisciplinary Studies 2, no. 1 (2015): 62. http://dx.doi.org/10.26417/ejis.v2i1.p62-67.

Pełny tekst źródła
Streszczenie:
The national and international security of states, nowadays, is threatened by many elements or factors, like environmental issues, the spread of mass destruction weapons, wars or ethnic conflicts in developing countries, organized crime, illegal trafficking and the corruption as a side effect of globalization. All these issues are considered as challenges that all the countries must cope with through the drafting of applicable and effective national and global security policies. The aim of this paper is the evaluation of security environment, setting forth various views over new threats or ris
Style APA, Harvard, Vancouver, ISO itp.
5

Liu, Jian, Dong Sheng Fan, Yue Wu, Guo Jiang Fu, and Mei Ju Liu. "Study of Remote Elevator Monitoring Fault Detection System." Advanced Materials Research 499 (April 2012): 459–63. http://dx.doi.org/10.4028/www.scientific.net/amr.499.459.

Pełny tekst źródła
Streszczenie:
Remote Elevator Monitoring (REM) is an important means to ensure elevator secure, reliable working. In this paper, an elevator remote monitoring control scheme is proposed based on multi-threaded technology. Due to all threads in the multi-threaded technology may visit the same overall situation object and the shared resource, center system communicates with embedded terminal is achieved by the method. The remote elevator monitoring system has been designed based on the multi-threaded technology; the main thread interface function is realized by monitor center software, other management operat
Style APA, Harvard, Vancouver, ISO itp.
6

Zou, Changwei, Xudong Wang, Yaoqing Gao, and Jingling Xue. "Buddy Stacks: Protecting Return Addresses with Efficient Thread-Local Storage and Runtime Re-Randomization." ACM Transactions on Software Engineering and Methodology 31, no. 2 (2022): 1–37. http://dx.doi.org/10.1145/3494516.

Pełny tekst źródła
Streszczenie:
Shadow stacks play an important role in protecting return addresses to mitigate ROP attacks. Parallel shadow stacks, which shadow the call stack of each thread at the same constant offset for all threads, are known not to support multi-threading well. On the other hand, compact shadow stacks must maintain a separate shadow stack pointer in thread-local storage (TLS) , which can be implemented in terms of a register or the per-thread Thread-Control-Block (TCB) , suffering from poor compatibility in the former or high performance overhead in the latter. In addition, shadow stacks are vulnerable
Style APA, Harvard, Vancouver, ISO itp.
7

Et. al., Pavithra G,. "A Novel Watermarking and Re-Encryption Approach to Avoid Illegal Content Sharing In Cloud." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 2603–9. http://dx.doi.org/10.17762/turcomat.v12i2.2229.

Pełny tekst źródła
Streszczenie:
Cloud computing is a set of information stored in a cloud, it can be accessed by the user whenever there is a need to access. Cloud computing is a combination of large interconnected computers. Importance of clod computing are storage and processing power to run application. Information can be access from anywhere .Data management is also one importance of the cloud computing. It improves performance. And also a lower infrastructure cost. Lower bandwidth does not support. Another important disadvantage is security thread. Cloud computing requires a constant internet connection. By using waterm
Style APA, Harvard, Vancouver, ISO itp.
8

Bui, Phuc, Minh Le, Binh Hoang, Nguyen Ngoc, and Huong Pham. "Data Partitioning and Asynchronous Processing to Improve the Embedded Software Performance on Multicore Processors." Informatics and Automation 21, no. 2 (2022): 243–74. http://dx.doi.org/10.15622/ia.21.2.2.

Pełny tekst źródła
Streszczenie:
Nowadays, ensuring information security is extremely inevitable and urgent. We are also witnessing the strong development of embedded systems, IoT. As a result, research to ensure information security for embedded software is being focused. However, studies on optimizing embedded software on multi-core processors to ensure information security and increase the performance of embedded software have not received much attention. The paper proposes and develops the embedded software performance improvement method on multi-core processors based on data partitioning and asynchronous processing. Data
Style APA, Harvard, Vancouver, ISO itp.
9

Priambodo, Agung. "PERSIMPANGAN DILEMA PENANGANAN PENGUNGSI ASING DI INDONESIA PASCA PENERBITAN PERPRES NO. 125 TAHUN 2016." Cakrawala - Jurnal Humaniora 21, no. 2 (2021): 122–29. http://dx.doi.org/10.31294/jc.v21i2.10995.

Pełny tekst źródła
Streszczenie:
This article aims to unravel the issues of the threat of waves of refugees and asylum seekers in Indonesia. The concept of non-traditional security is adopted in this study as a framework for analyzing social problems of refugees and asylum seekers that have an impact on national security and interests. This research uses descriptive-qualitative analysis method to draw a common thread of threats that may arise along with the implementation of Presidential Decree no. 125 of 2016 concerning Handling of Refugees from Overseas. Referring to the results of data analysis, this study draws four reaso
Style APA, Harvard, Vancouver, ISO itp.
10

Woody, Carol. "Mission Thread Security Analysis: A Tool for Systems Engineers to Characterize Operational Security behavior." INSIGHT 16, no. 2 (2013): 37–40. http://dx.doi.org/10.1002/inst.201316237.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
11

Eilers, Marco, Thibault Dardinier, and Peter Müller. "CommCSL: Proving Information Flow Security for Concurrent Programs using Abstract Commutativity." Proceedings of the ACM on Programming Languages 7, PLDI (2023): 1682–707. http://dx.doi.org/10.1145/3591289.

Pełny tekst źródła
Streszczenie:
Information flow security ensures that the secret data manipulated by a program does not influence its observable output. Proving information flow security is especially challenging for concurrent programs, where operations on secret data may influence the execution time of a thread and, thereby, the interleaving between different threads. Such internal timing channels may affect the observable outcome of a program even if an attacker does not observe execution times. Existing verification techniques for information flow security in concurrent programs attempt to prove that secret data does no
Style APA, Harvard, Vancouver, ISO itp.
12

Manasa, R., and Jayanthila Devi A. "Cyber Security Attacks Detecting Thread in the Virtual World of Corporate Sectors." International Journal of Case Studies in Business, IT, and Education (IJCSBE) 7, no. 2 (2023): 90–105. https://doi.org/10.5281/zenodo.7818522.

Pełny tekst źródła
Streszczenie:
<strong>Purpose: </strong><em>Attempting to get access to a computer, computer network, or computing system without authorization is known as a cyber-attack. To modify, impede, erase, manipulate or steal data from computer systems is the purpose of a cyber-attack. These attacks may be carried out in a number of ways. This placeholder information is used to identify a single instance of the use of a prgramme that may support numerous users at once. A thread is an information that a programme requires to serve a single user or a single service request. Cybercriminals make use of technology to do
Style APA, Harvard, Vancouver, ISO itp.
13

Bhatti, David Samuel, Salbia Sidrat, Shahzad Saleem, et al. "Performance analysis: Securing SIP on multi-threaded/multi-core proxy server using public keys on Diffie–Hellman (DH) in single and multi-server queuing scenarios." PLOS ONE 19, no. 1 (2024): e0293626. http://dx.doi.org/10.1371/journal.pone.0293626.

Pełny tekst źródła
Streszczenie:
The rapid replacement of PSTN with VOIP networks indicates the definitive phase-out of the PBX/PABX with smartphone-based VOIP technology that uses WLAN connectivity for local communication; however, security remains a key issue, regardless of the communication coverage area. Session initiation protocol (SIP) is one of the most widely adopted VOIP connection establishment protocols but requires added security. On the Internet, different security protocols, such as HTTPS (SSL/TLS), IPSec, and S/MIME, are used to protect SIP communication. These protocols require sophisticated infrastructure and
Style APA, Harvard, Vancouver, ISO itp.
14

Sumaira Hassan, Muhammad Shafiullah, Ali Ahmed, and Fahim Muhammad Khan. "Advances in AI to Predict and Prevent Cyber Security Attacks: A Comprehensive Analysis of Modern World." Physical Education, Health and Social Sciences 3, no. 1 (2025): 47–55. https://doi.org/10.63163/jpehss.v3i1.209.

Pełny tekst źródła
Streszczenie:
The following research paper emphasis over the importance of AI and it’s one component that is Cyber Security that has now became an essential part to address CS threats &amp; frauds and detect any more attacks while mitigating issues arises from it. The research paper discovers hidden significance of AI in cyber security that emphasize on advanced machine learning algorithms predictive analytics and automatic to enhance thread detections and response mechanisms. The global use of artificial intelligence in cyber security is not just restricted to one state but it is now becoming the essential
Style APA, Harvard, Vancouver, ISO itp.
15

Kambourakis, Georgios, Constantinos Kolias, Dimitrios Geneiatakis, Georgios Karopoulos, Georgios Michail Makrakis, and Ioannis Kounelis. "A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks." Symmetry 12, no. 4 (2020): 579. http://dx.doi.org/10.3390/sym12040579.

Pełny tekst źródła
Streszczenie:
Protocol stacks specifically designed for the Internet of Things (IoT) have become commonplace. At the same time, security and privacy concerns regarding IoT technologies are also attracting significant attention given the risks that are inherently associated with the respective devices and their numerous applications, ranging from healthcare, smart homes, and cities, to intelligent transportation systems and industrial automation. Considering the still heterogeneous nature of the majority of IoT protocols, a major concern is to find common references for investigating and analyzing their secu
Style APA, Harvard, Vancouver, ISO itp.
16

Giri, Roshan, Shanker Prasad Chimouriya, and Bal Ram Ghimire. "STUDY OF SECURITY FEATURES PRESENT IN NEPALI PASSPORT." JOURNAL OF TECHNOLOGY & INNOVATION 3, no. 2 (2023): 58–63. http://dx.doi.org/10.26480/jtin.02.2023.58.63.

Pełny tekst źródła
Streszczenie:
Security features present on Nepali passport are examined with the help of Video Spectral Comparator. Mainly examination is carried out with application ultra-violet light, normal light, oblique light and transmitted light. We obtain different types of security features including florescence, ghost image, binding thread, optical fiber, punched number, barcode, micro-printing, watermark, emboss etc. The main aim of this work is to provide information about security features present in Nepali passport so that concern agencies as well as general public to distinguish between genuine and fake pass
Style APA, Harvard, Vancouver, ISO itp.
17

Gharibshah, Joobin, Evangelos E. Papalexakis, and Michalis Faloutsos. "REST: A Thread Embedding Approach for Identifying and Classifying User-Specified Information in Security Forums." Proceedings of the International AAAI Conference on Web and Social Media 14 (May 26, 2020): 217–28. http://dx.doi.org/10.1609/icwsm.v14i1.7293.

Pełny tekst źródła
Streszczenie:
How can we extract useful information from a security forum? We focus on identifying threads of interest to a security professional: (a) alerts of worrisome events, such as attacks, (b) offering of malicious services and products, (c) hacking information to perform malicious acts, and (d) useful security-related experiences. The analysis of security forums is in its infancy despite several promising recent works. Novel approaches are needed to address the challenges in this domain: (a) the difficulty in specifying the “topics” of interest efficiently, and (b) the unstructured and informal natu
Style APA, Harvard, Vancouver, ISO itp.
18

Li, Feng, Zhi Hua Wang, and Hu Cheng Li. "Fast Static Security Analysis of Day-Ahead Generation Scheduling 96 Period Cases Adapting to Large Power System." Advanced Materials Research 732-733 (August 2013): 669–76. http://dx.doi.org/10.4028/www.scientific.net/amr.732-733.669.

Pełny tekst źródła
Streszczenie:
It’s important to improve the speed of security analysis of 96 period generation scheduling cases. Based on the characteristics of 96 period cases’ security analysis, four technical proposals were presented. They were following as fast scanning and analysis technology based on DC power flow screening, multiple thread parallel computing adapted to a multiple contingency case, multiple process parallel computing technology adapted to multiple period cases. Detailed test examples showed that the proposed methods could contribute much to fast security analysis of 96 period cases’ day-ahead dispatc
Style APA, Harvard, Vancouver, ISO itp.
19

Pang, Toh Yen, Juan D. Pelaez Restrepo, Chi-Tsun Cheng, Alim Yasin, Hailey Lim, and Miro Miletic. "Developing a Digital Twin and Digital Thread Framework for an ‘Industry 4.0’ Shipyard." Applied Sciences 11, no. 3 (2021): 1097. http://dx.doi.org/10.3390/app11031097.

Pełny tekst źródła
Streszczenie:
This paper provides an overview of the current state-of-the-art digital twin and digital thread technology in industrial operations. Both are transformational technologies that have the advantage of improving the efficiency of current design and manufacturing. Digital twin is an important element of the Industry 4.0 digitalization process; however, the huge amount of data that are generated and collected by a digital twin offer challenges in handling, processing and storage. The paper aims to report on the development of a new framework that combines the digital twin and digital thread for bet
Style APA, Harvard, Vancouver, ISO itp.
20

Giri, R., P. Bhattarai, S. P. Chimouriya, and B. R. Ghimire. "Examination of Security Features in Nepali Currency of Denomination Rs. 500 and Rs. 1000 Using Video Spectral Comparator-6000." Journal of Nepal Physical Society 7, no. 4 (2021): 36–42. http://dx.doi.org/10.3126/jnphyssoc.v7i4.42929.

Pełny tekst źródła
Streszczenie:
In this work, we have studied security features of Nepali currencies of denomination Rs. 500 and Rs. 1000 of recent two series with the help of Video Spectral Comparator-6000. During examination, mostly ultraviolet, normal, transmitted and oblique light are used. We found nine different security features like fluorescence, water mark, micro text, security thread, intaglio print, see through registor, emboss, optically variable ink and latent image in this work. One feature, latent image is found to be completely removed in new series of both Rs. 500 and Rs. 1000 whereas new important security
Style APA, Harvard, Vancouver, ISO itp.
21

B N, Mangalagowri, and Dr N. Sandeep Varma. "Intrusion Detection System of IPv6 Network." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (2022): 1267–74. http://dx.doi.org/10.22214/ijraset.2022.46628.

Pełny tekst źródła
Streszczenie:
Abstract: There are variations within the network of the differential computing system's underlying IPv6 network. There are different blind zones for security detection. It is thoroughly investigated how the automatic data processing system differs from the underlying IPv6 network. An enhanced underlying IPv6 network security detection module design approach is suggested for the multicomputer system based on this concept. One gets the comprehensive module design plan. The new technologies like receiving thread domain, object forwarding domain, and file buffer are taken into account by the netw
Style APA, Harvard, Vancouver, ISO itp.
22

Jonev, Katarina, Ivan Rancic, and Hatidza Berisha. "CONTEMPORARY WARS AND ARMED CONFLICTS." Knowledge International Journal 26, no. 6 (2019): 1827–37. http://dx.doi.org/10.35120/kij26061827j.

Pełny tekst źródła
Streszczenie:
The characteristics of contemporary trends suggest that, in parallel with the changes that globalization has caused in most aspects of human life, the changes have taken place in the reasons for the emergence of conflicts in the new environment, in the ways of solving the newly emerging problems, but also in the view of the growing confrontation in the world. Each of these associations contains asymmetry as the basic characteristic, and we declare such types of conflict as asymmetric armed conflicts or wars, or the use of armed force in response to asymmetric security threats. In most cases, s
Style APA, Harvard, Vancouver, ISO itp.
23

Zahraa Raji Al-zobaiby. "Developing data mining algorithms for predicting cyber security risks using predictive analytics." World Journal of Advanced Research and Reviews 25, no. 2 (2025): 585–92. https://doi.org/10.30574/wjarr.2025.25.2.0344.

Pełny tekst źródła
Streszczenie:
Data mining methods used as one of successfully potential solution against cyber risks, big data and electronic thread increasing faster in the last year's, so it forms a challenge to cyber security, data prediction used as one of the fundamental tools to predict cyber risks and improving security methods. Cyber security is one of important popular challenges in the current era where cyber-attacks and risks increasing, so fast it is very important to develop tools and techniques of cyber security, data mining techniques one of the important method used to solve cyber security problems. In this
Style APA, Harvard, Vancouver, ISO itp.
24

Agrawal and Mankar. "Mobile Cloud Computing." International Journal of Ingenious Research, Invention and Development (IJIRID) 1, no. 2 (2023): 29–32. https://doi.org/10.5281/zenodo.7820178.

Pełny tekst źródła
Streszczenie:
Mobile Cloud Computing (MCC) which combines mobile computing and cloud computing, has become one of the industry buzz words and a major discussion thread in the IT world since 2009. As MCC is still at the early stage of development, it is necessary to grasp a thorough understanding of the technology in order to point out the direction of future research. With the latter aim, this paper presents a review on the background and principle of MCC, characteristics, recent research work, and future research trends. A brief account on the background of MCC: from mobile computing to cloud computing is
Style APA, Harvard, Vancouver, ISO itp.
25

Matveev, Aleksei Aleksandrovich. "Migration security within the system of global security: mechanisms, principles, actors." Философская мысль, no. 3 (March 2021): 66–80. http://dx.doi.org/10.25136/2409-8728.2021.3.33512.

Pełny tekst źródła
Streszczenie:
This article is dedicated to migration security, which is viewed within the paradigm of sustainable development and as part of the global security system. The author attempts to reveal the mechanisms and principles that define the effect of migration security upon the political and social stability of the countries in the period of migration crisis. The role actors in achieving sustainable development through the discourse of global security is determined. For solving the set tasks, the article employs comparative and systematic approaches. The key factors of the global security system are ide
Style APA, Harvard, Vancouver, ISO itp.
26

Wang, Yi-Wei, and Ja-Ling Wu. "A Privacy-Preserving Symptoms Retrieval System with the Aid of Homomorphic Encryption and Private Set Intersection Schemes." Algorithms 16, no. 5 (2023): 244. http://dx.doi.org/10.3390/a16050244.

Pełny tekst źródła
Streszczenie:
This work presents an efficient and effective system allowing hospitals to share patients’ private information while ensuring that each hospital database’s medical records will not be leaked; moreover, the privacy of patients who access the data will also be protected. We assume that the thread model of the hospital’s security is semi-honest (i.e., curious but honest), and each hospital hired a trusted medical records department administrator to manage patients’ private information from other hospitals. With the help of Homomorphic Encryption- and Private Set Intersection -related algorithms,
Style APA, Harvard, Vancouver, ISO itp.
27

Geppert, Karol, and Jerzy Konieczny. "Analysis of Potential Threats to the Critical Infrastructure of the 31st Tactical Air Base, in the Context of the Security of the Poznan Agglomeration." Przegląd Strategiczny, no. 16 (January 22, 2024): 219–35. http://dx.doi.org/10.14746/ps.2023.1.16.

Pełny tekst źródła
Streszczenie:
The main purpose of the article is an attempt to analyze the potential threats to the critical infrastructure of the 31st Tactical Air Base in Poznań-Krzesiny in terms of the security of the Poznań agglomeration. The main threats that may occur have been indicated in the context of military, non-military, asymmetric or hybrid activities. In addition, the mortgage effects of the actions taken, which can have a measurable impact on the safety of the Poznań agglomeration, were discussed and presented. An additional thread in the article is the indication of the existing threats that took place in
Style APA, Harvard, Vancouver, ISO itp.
28

Singh, Anshul, Aryan Shenoy, and Nihar Thanekar. "Chain Thread: Blockchain-Powered Product Verification and Authenticity Tracking." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 4976–81. https://doi.org/10.22214/ijraset.2025.69592.

Pełny tekst źródła
Streszczenie:
Abstract: Fake Product Identification through Blockchain is a decentralized application (dApp) designed to combat counterfeit goods by providing a transparent, secure, and efficient product verification system. The platform integrates Blockchain technology with QR Codes and NFC (Near Field Communication) tags, ensuring product authenticity from registration to verification. The system allows manufacturers to register products on the blockchain, associating each product with a unique identifier (serial number) linked to a QR code or NFC tag. Sellers and consumers can then scan the product's cod
Style APA, Harvard, Vancouver, ISO itp.
29

Anderson, Ross, and Tyler Moore. "Information security: where computer science, economics and psychology meet." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 367, no. 1898 (2009): 2717–27. http://dx.doi.org/10.1098/rsta.2009.0027.

Pełny tekst źródła
Streszczenie:
Until ca. 2000, information security was seen as a technological discipline, based on computer science but with mathematics helping in the design of ciphers and protocols. That perspective started to change as researchers and practitioners realized the importance of economics. As distributed systems are increasingly composed of machines that belong to principals with divergent interests, incentives are becoming as important to dependability as technical design. A thriving new field of information security economics provides valuable insights not just into ‘security’ topics such as privacy, bug
Style APA, Harvard, Vancouver, ISO itp.
30

Mr., Rajeev &. Mr. Dhirender. "A SURVEY OF URBAN PEOPLE AWARENESS ABOUT NEW INDIAN CURRENCY SECURITY FEATURES AFTER DEMONETIZATION." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 7 (2017): 563–67. https://doi.org/10.5281/zenodo.829771.

Pełny tekst źródła
Streszczenie:
Use of currency notes is increasing year by year and so does risk of its holders.It has become need of hour for every country to make its currency difficult to counterfeit.Security features and security printing are the only solution for this problem.Security features not only prevent duplicacyof notes but also save the poor citizens from possible financial loss.This survey work was carried out to understand the awareness level about security features in new currency notes because relevancy of such work has increased by manifold in recent era after demonetization.
Style APA, Harvard, Vancouver, ISO itp.
31

Zhang, Rui Xia, Ya Liang Wang, and Yan Lan Liu. "Research on File System Event Monitoring in Android Platform." Applied Mechanics and Materials 443 (October 2013): 494–98. http://dx.doi.org/10.4028/www.scientific.net/amm.443.494.

Pełny tekst źródła
Streszczenie:
Android is a standard and popular platform of various smart phone. Security thread is a major problem to smart phone. File system event monitoring is essential for many types of programs ranging from file managers to security tools. In this paper, we make research on file system event monitoring. Our approach involves file nodes monitor by Android API and Linux native system call. We compare different features between them. It shows that each method has its benefit and limitation. Linux system calls method outperforms API in flexibility and scalability. But it has its un-convenience to user fo
Style APA, Harvard, Vancouver, ISO itp.
32

Paul Okudolo, Ikemefuna Taire, and Itumeleng Mekoa. "Recurring thread in local administration and its impact on human security in Africa : experience from Nigeria." African Renaissance SI, no. 3 (2019): 57–74. http://dx.doi.org/10.31920/2516-5305/2019/sin3a4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
33

Liu, Yu, Zhibo Pang, Gyorgy Dan, Dapeng Lan, and Shaofang Gong. "A Taxonomy for the Security Assessment of IP-Based Building Automation Systems: The Case of Thread." IEEE Transactions on Industrial Informatics 14, no. 9 (2018): 4113–23. http://dx.doi.org/10.1109/tii.2018.2844955.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

Collins, Rob, Peter Pearson, and Peter Chattaway. "3.4.2 Improving Systems Integrity by Using Thread Analysis for Design Validation." INCOSE International Symposium 10, no. 1 (2000): 446–54. http://dx.doi.org/10.1002/j.2334-5837.2000.tb00410.x.

Pełny tekst źródła
Streszczenie:
AbstractThe techniques described in this paper have been developed and applied on a series of major systems engineering projects, most recently including the BOWMAN programme. BOWMAN will encompass the design, development, manufacture, conversion (rollout) and support of the new communications systems for the British Army. The BOWMAN contract will be valued in excess of £1.5 Billion and be delivered and installed over a period of 6 years.Thread Analysis is a technique that enables systems design to be systematically inspected with respect to a number of desirable properties. Threads analysis f
Style APA, Harvard, Vancouver, ISO itp.
35

Chandra, G. Rajesh, K. Jagan Mohan, Osamah Ibrahim Khalaf, et al. "A superior secure key spawn using boosted uniqueness encryption for cloud computing in advanced extensive mobile network." SINERGI 28, no. 2 (2024): 405. http://dx.doi.org/10.22441/sinergi.2024.2.019.

Pełny tekst źródła
Streszczenie:
The cloud computing sector, including mobile networks has increased in the present time. Because of advanced features and security related information in cloud. So many methods are available for handling these problems. Cloud security, large number of methods existing for provide security. Among that, so many widespread techniques cast-off to protected data in cloud based on Individuality based encryption. This method specialty is allowing only authorized end users for access legal data and avoid smalevolent attack. Individuality -based encryption method follows up the four stages like Name, K
Style APA, Harvard, Vancouver, ISO itp.
36

Flynn, Christopher, and Emily Tsokos. "Energy security, moratoria and domestic gas: Australia, LNG and its gas policy catch-22." APPEA Journal 57, no. 1 (2017): 26. http://dx.doi.org/10.1071/aj16232.

Pełny tekst źródła
Streszczenie:
In a region undergoing rapid and profound geopolitical change, energy security will be more important than ever. As a key regional energy producer, Australia will play a fundamental role in the energy security of its major trading partners. However, ironically, it also faces energy security challenges of its own. Over the next 12months, as Australia becomes the world’s largest producer of liquefied natural gas (LNG), its own domestic gas demand will also continue to grow. At the same time, one or more of our LNG facilities is expected to start to face significant upstream gas supply constraint
Style APA, Harvard, Vancouver, ISO itp.
37

Brooks, Mitchell, and Matthew Hause. "Model‐Based Cyber Security at the Enterprise and Systems Level." INCOSE International Symposium 33, no. 1 (2023): 649–65. http://dx.doi.org/10.1002/iis2.13044.

Pełny tekst źródła
Streszczenie:
AbstractModel‐Based Engineering (MBE) has transformed the worlds of mechanical, electrical, chemical, software, systems engineering, and now cybersecurity. Model based cybersecurity allows this concern to be addressed as an integrated part of the solution as opposed to being a separate solution. To best take advantage of this, we must examine which modeling practices, languages, and standards are best suited to handle cybersecurity. Currently, UAF is the most effective tool being used to provide Model‐Based Cyber Security at the Enterprise and Systems Level. It achieves this largely through it
Style APA, Harvard, Vancouver, ISO itp.
38

Wang, Wen Cai, Wen Bin Wei, and Ling Wang. "Numerical Simulation Study on Combined Supporting Scheme of Bolts and Anchor Cable." Applied Mechanics and Materials 638-640 (September 2014): 898–903. http://dx.doi.org/10.4028/www.scientific.net/amm.638-640.898.

Pełny tekst źródła
Streszczenie:
Aiming at the face roadway 22109 of Cuncaota coal mine, using FLAC3Dnumerical simulation software, 19 of 5 groups about bolt and anchor combined support schemes were analysed and compared, and the reasonable scheme of φ18×2000mm thread steel bolt and φ17.8×6500mm anchor cable combined support was obtained. Support result of this scheme was analysed with FLAC3Dsoftware, the result show that this scheme can support the roadway effectively. Practical application show that this scheme can achieve the security, economical and effective support result, and can be used in this type of roadway.
Style APA, Harvard, Vancouver, ISO itp.
39

Sandhya, P. K*1 &. Prof. K. S. Valsaraj2. "SURVEY ON SMART HOME TECHNOLOGIES TO UNDERSTAND ITS SCALING ISSUES." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Metanoia 19 (April 5, 2019): 59–62. https://doi.org/10.5281/zenodo.2630850.

Pełny tekst źródła
Streszczenie:
A perfect smart home technology is like an interface between humans and systems. It can detect the human feelings and situations. Then it automatically control the home appliances according to their needs. Home appliances can use various type of technologies for communication. In this paper characteristics of different wireless communication techniques like Wi-Fi, ZigBee, Bluetooth, EnOcean, Z-Wave, WiMax, Thread and GSM are studied and their working principles are compared with each other. From this users can choose their own choice of technologies. In SH-IoT the key requirements are channel
Style APA, Harvard, Vancouver, ISO itp.
40

Xia, Zhixin, Xiaolei Yang, Afei Li, Yongshan Liu, and Siyuan He. "Research on Information Security Transmission of Port Multi-Thread Equipment Based on Advanced Encryption Standard and Preprocessing Optimization." Applied Sciences 14, no. 24 (2024): 11887. https://doi.org/10.3390/app142411887.

Pełny tekst źródła
Streszczenie:
Based on the C/S multithreaded control framework, this article used AES encryption technology, and by customizing the S-boxes therein and differential diffusion of the S-boxes, it improved the randomness of the ciphertexts and the resistance to differential attacks, and reduced the likelihood of leakage in the process of data computation. On this basis, in order to reduce the cost overhead generated by AES encryption, this paper used the pre-computed method of optimizing S-boxes and Mixcolumn matrices to be applied to the multithreaded control framework, which improved the computation rate of
Style APA, Harvard, Vancouver, ISO itp.
41

Maj, Ewa. "Suwerenność w myśli politycznej współczesnego ruchu narodowego w Polsce." Myśl Polityczna. Political Thought 2(22) (2024): 31–54. https://doi.org/10.31268/mppt.2024.14.

Pełny tekst źródła
Streszczenie:
The contemporary national movement in Poland is characterised by a wide range of ideological and structural diversity. Its political thought presents a complex mosaic of issues vital to the nation and the state. The various ideological currents include national-Catholic, national-conservative, national-liberal, national-radical, and Slavic perspectives. A common thread among these movements is the identification of sovereignty with the welfare of the Polish nation. This article examines political sovereignty within the context of Poland’s political system and its internal and external security
Style APA, Harvard, Vancouver, ISO itp.
42

Nuriev, Marat, Rimma Zaripova, Sergey Sitnikov, and Rustam Nurgaliev. "The principles of building a parallel program for steganographic file protection." E3S Web of Conferences 458 (2023): 09027. http://dx.doi.org/10.1051/e3sconf/202345809027.

Pełny tekst źródła
Streszczenie:
In the modern era, the unprecedented growth of data and its consequential demands on transmission and storage systems have highlighted the necessity for efficient and secure information processing mechanisms. This paper delves into the potential of steganography as a robust tool for ensuring confidentiality by embedding data covertly within other files. Recognizing the limitations of traditional steganographic techniques in the face of expansive contemporary data sets, the paper explores the amalgamation of parallel programming with steganographic processes. Such a fusion promises to distribut
Style APA, Harvard, Vancouver, ISO itp.
43

Li, Hui. "Computer Security Issues and Legal System Based on Cloud Computing." Computational Intelligence and Neuroscience 2022 (July 11, 2022): 1–11. http://dx.doi.org/10.1155/2022/8112212.

Pełny tekst źródła
Streszczenie:
To effectively improve the security and accuracy of computer information storage, a computer security problem and legal system based on cloud computing are proposed. Firstly, this article details the evolution of cloud computing, its characteristics, architecture, and application status of cloud computing in detail. Second, we discussed security strategies to ensure the confidentiality and integrity of cloud computing information, focuses on the data encryption technology of cloud data security, and designs and implements the data backup and recovery system based on the cloud platform. The cor
Style APA, Harvard, Vancouver, ISO itp.
44

Chen, Wei Bing, Gang Lin Zhang, and Lu Feng. "Realization and Design of Mobile Video Surveillance Client Platform Based on Smart Phone." Applied Mechanics and Materials 602-605 (August 2014): 1753–56. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.1753.

Pełny tekst źródła
Streszczenie:
To realize video surveillance at any time and any place, a kind of video surveillance platform based on 3G smart phone was designed. In this paper, the general design scheme of video surveillance system was firstly introduced. Then, the surveillance software development method of smart phone client, the transmission mode and transmission protocol of surveillance video were also emphatically described. This system used SVAC which is kind of specifying surveillance video to meet security-monitoring demand. It used multi-image display to realized multi-channel video surveillance, and also used mu
Style APA, Harvard, Vancouver, ISO itp.
45

Xiong, Qi, Xiao Feng He, and Jie Tang. "Design and Implementation of Authentication Server with High Concurrency." Advanced Materials Research 834-836 (October 2013): 1791–94. http://dx.doi.org/10.4028/www.scientific.net/amr.834-836.1791.

Pełny tekst źródła
Streszczenie:
With increasing problems of network security, a server with high concurrency is designed here to deal with identity authentication. In the general design of the server, RSA and DES algorithm are used. RSA algorithm is used to encrypt or decrypt users identity information. DES algorithm is used to ensure the information will not be stolen. In order to ensure the server has high concurrency, the technology of epoll and thread pool is applied to design the server in the Linux system. In the end , integration testing and stress testing are performed to test its reliability and stability. The testi
Style APA, Harvard, Vancouver, ISO itp.
46

Jamiluddin and Novia Yuliana. "THE IMPACT OF THREAD KELAMBU WATERFALL TOURISM ON THE SOCIO-ECONOMIC CONDITIONS OF THE PEOPLE OF AIK BERIK VILLAGE, BATUKLIANG UTARA SUB-DISTRICT CENTRAL LOMBOK DISTRICT." Proceedings of the International Conference on Social Studies Education (ICoSSE) 1, no. 1 (2024): 212–19. https://doi.org/10.20414/icosse.v1i1.23.

Pełny tekst źródła
Streszczenie:
This study aims to determine the positive and negative impacts of the existence of thread kelambu waterfall tourism on the social and economic conditions of the community and the efforts of the local government in handling the negative impacts of tourism on the people of Aik Berik Village. The type of research used in this research is qualitative research using a descriptive approach, where the data will be expressed in the form of sentences and descriptions, even in the form of short stories. The data collection techniques used are observation, interviews and documentation. From the results o
Style APA, Harvard, Vancouver, ISO itp.
47

Wang, Kunpeng, Jingmei Li, Zhongchuan Fu, and Tianyu Chen. "IRePf: An Instruction Reorganization Virtual Platform for Kernel Stack Overflow Detection." Security and Communication Networks 2022 (May 13, 2022): 1–14. http://dx.doi.org/10.1155/2022/7645210.

Pełny tekst źródła
Streszczenie:
Stack overflow vulnerabilities are among the most common security issues. However, the existing stack overflow detection solutions only protect the return address and ignore the imbalance between function calls and returns in the system, which will lead to a higher false-positive rate. In this paper, we propose an instruction reorganization virtual platform technique for kernel stack overflow detection, named IRePf. It can dynamically monitor the kernel stack when the system is running through dynamic reorganization instructions, thread creation and termination, call instructions, and RET inst
Style APA, Harvard, Vancouver, ISO itp.
48

Al-Refai, Hasan, and Ali Ahmad Alawneh. "User Authentication and Authorization Framework in IoT Protocols." Computers 11, no. 10 (2022): 147. http://dx.doi.org/10.3390/computers11100147.

Pełny tekst źródła
Streszczenie:
The Internet of Things (IoT) has become one of the most attractive domains nowadays. It works by creating a special network between physical devices such as vehicles, home equipment, and other items. In recent days, the common technologies of communication such as Wi-Fi and 2G/3G/4G cellular networks are insufficient for IoT networks because they are designed to serve appliances with immense processing capabilities such as laptops and PCs. Moreover, most of these technologies are centralized and use an existing infrastructure. Currently, new communication technologies such as Z-Wave, 6LowPAN,
Style APA, Harvard, Vancouver, ISO itp.
49

Singhal, Prateek, Puneet Sharma, and Sheenu Rizvi. "Thwarting Sybil Attack by CAM Method in WSN using Cooja Simulator Framework." International Journal of Engineering & Technology 7, no. 4.19 (2018): 589–95. http://dx.doi.org/10.14419/ijet.v7i4.19.27965.

Pełny tekst źródła
Streszczenie:
In the area of IoT Sybil attack is vulnerable where the fake identities can manipulate or misuse pseudoidentities to negotiate the successof spam and Internet of Things. The nodes illegitimately claim multiple identities against sensor and Ad-Hoc networks. The hostile or faulty remote computing elements faces the security thread on large- scale peer-to-peer systems. We have a trust agency to certify the identities prevent from the “Sybil Attack”. Multiple identities that control sustainable fraction of systems so prevent from loss of information while data exchanging via networks or intern
Style APA, Harvard, Vancouver, ISO itp.
50

Indarti, Erlyn. "Strengthen Security and Public Order: Accountability Management in Improving the Quality of Law Enforcement." Academic Journal of Interdisciplinary Studies 9, no. 2 (2020): 82. http://dx.doi.org/10.36941/ajis-2020-0025.

Pełny tekst źródła
Streszczenie:
In the framework of Democratic Policing Reforms, since 1979 the United Nations has actually adopted what is called the Code of Conduct for Law Enforcement Officials. This Code of Conduct includes the idea that the police should represent and be accountable to the entire community. Within the Indonesian case, it is recognized that there is a red thread between supervision and accountability of police performance, particularly law enforcement. However, more than a decade since police reform began in Indonesia, the demands of the wider community for accountability in carrying out police duties, p
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!