全部
期刊
图书
会议
学位论文
当前检索条件:
关键词: Security>
已选文献 0 清除 导出文献
主题排序 时间排序
123957 结果
  • 4132
每页显示  
Journal
摘要: We explore a major European competition decision, the 2012-18 Gazprom case, using a global gas market simulation model. We find that access to LNG markets alone is insufficient to counterbalance Gazprom's strategic behaviour; central and eastern Europe (CEE) needs to be well interconnected with bidirectional flow capability. 'Swap deals' created by the decision facilitate CEE market integration, while limiting Gazprom's potential market power. Such deals may increase the diversity of contracted关键词: Gazprom;European Commission;Market Power;Natural Gas;Security of Supply;Competition;Long-term contracts;Swap deals
收藏原文链接
Journal
摘要: Scalability is an important feature for the long term adoption of a rating system that determines the privacy and security of Internet of Toys (IoToys). As technology evolves and innovations are introduced in the IoToy market, the rating system must be capable of including the impact of new factors in the overall safety of the toy. Similarly obsolete factors should be easily removable. The rating system should also account for the difference in the weightage of individual factors. This research 关键词: Children;IoToy;Privacy;Security;Consumer label;Manufacturers;IoToys;PI;PDPC;PDPA
收藏原文链接
Journal
摘要: Android Smartphones are proliferating extensively in the digital world due to their widespread applications in a myriad of fields. The increased popularity of the android platform entices malware developers to design malicious apps to achieve their malevolent intents. Also, static analysis approaches fail to detect run-time behaviors of malicious apps. To address these issues, an optimal unification of static and dynamic features for smartphone security analysis is proposed. The proposed solutio关键词: Fusion; smartphone; android; security analysis; malware detection
收藏原文链接
Journal
摘要: With recent advancements made in wireless communication techniques, wireless sensors have become an essential component in both data collection as well as tracking applications. Wireless Sensor Network (WSN) is an integral part of Internet of Things (IoT) and it encounters different kinds of security issues. Blockchain is designed as a game changer for highly secure and effective digital society. So, the current research paper focuses on the design of Metaheuristic-based Clustering with Routing 关键词: Wireless networks; blockchain; routing protocol; clustering; security; metaheuristics
收藏原文链接
Journal
摘要: The latest 6G improvements secured autonomous driving's realism in Intelligent Autonomous Transport Systems (IATS). Despite the IATS's benefits, security remains a significant challenge. Blockchain technology has grown in popularity as a means of implementing safe, dependable, and decentralised independent IATS systems, allowing for more utilisation of legacy IATS infrastructures and resources, which is especially advantageous for crowdsourcing technologies. Blockchain technology can be used to 关键词: Blockchain; ethereum; intelligent autonomous transport system; security; deep belief network
收藏原文链接
Journal
G. Ravikumar;K. Venkatachalam;Mohammed A. AlZain;Mehedi Masud;Mohamed Abouhawwash;56;
COMPUTER SYSTEMS SCIENCE AND ENGINEERINGVolume 44, Issue 1, 2023, PP 945-959
摘要: Sleep apnea syndrome (SAS) is a breathing disorder while a person is asleep. The traditional method for examining SAS is Polysomnography (PSG). The standard procedure of PSG requires complete overnight observation in a laboratory. PSG typically provides accurate results, but it is expensive and time consuming. However, for people with Sleep apnea (SA), available beds and laboratories are limited. Resultantly, it may produce inaccurate diagnosis. Thus, this paper proposes the Internet of Medical 关键词: Sleep apnea; polysomnography; IOMT; fog node; security; neural network; KNN; signature encryption; sensor
收藏原文链接
Journal
R. Rajadevi;K. Venkatachalam;Mehedi Masud;Mohammed A. AlZain;Mohamed Abouhawwash;56;
COMPUTER SYSTEMS SCIENCE AND ENGINEERINGVolume 44, Issue 1, 2023, PP 339-350
摘要: The Internet of Medical Things (IoMT) is an online device that senses and transmits medical data from users to physicians within a time interval. In, recent years, IoMT has rapidly grown in the medical field to provide healthcare services without physical appearance. With the use of sensors, IoMT applications are used in healthcare management. In such applications, one of the most important factors is data security, given that its transmission over the network may cause obtrusion. For data secur关键词: Blockchain; IoMT; malicious code detection; security; secure data management framework; data management; PoA
收藏原文链接
Journal
Fawaz Alassery;Ahmed Alzahrani;Asif Irshad Khan;Kanika Sharma;Masood Ahmad;Raees Ahmad Khan;4;
COMPUTER SYSTEMS SCIENCE AND ENGINEERINGVolume 44, Issue 1, 2023, PP 859-872
摘要: In recent years, it has been observed that the disclosure of information increases the risk of terrorism. Without restricting the accessibility of information, providing security is difficult. So, there is a demand for time to fill the gap between security and accessibility of information. In fact, security tools should be usable for improving the security as well as the accessibility of information. Though security and accessibility are not directly influenced, some of their factors are indirec关键词: Information security; big data; big data security life cycle; fuzzy AHP
收藏原文链接
Journal
摘要: The exponential advancement in telecommunication embeds the Internet in every aspect of communication. Interconnections of networks all over the world impose monumental risks on the Internet. A Flooding Attack (FA) is one of the major intimidating risks on the Internet where legitimate users are prevented from accessing network services. Irrespective of the protective measures incorporated in the communication infrastructure, FA still persists due to the lack of global cooperation. Most of the e关键词: Flooding; spoofing; cooperative solution; multilevel security; filtering; pushback
收藏原文链接
Journal
摘要: Internet of Medical Things (IoMT) enabled e-healthcare has the potential to greately improve conventional healthcare services significantly. However, security and privacy become major issues of IoMT because of the restricted processing abilities, storage, and energy constraints of the sensors. Therefore, it leads to infeasibility of developing traditional cryptographic solutions to the IoMT sensors. In order to ensure security on sensitive medical data, effective encryption and authentication te关键词: User authentication; security; privacy; internet of medical things; homomorphic encryption; optimal key generation
收藏原文链接
Journal
Mahmood Al-Bahri;Abdelhamied Ateya;23;Ammar Muthanna;Abeer D. Algarni;Naglaa F. Soliman;4;
Intelligent Automation & Soft ComputingVolume 35, Issue 1, 2023, PP 97-110
摘要: The Internet of Things (IoT) is a recent technology, which implies the union of objects, “things”, into a single worldwide network. This promising paradigm faces many design challenges associated with the dramatic increase in the number of end-devices. Device identification is one of these challenges that becomes complicated with the increase of network devices. Despite this, there is still no universally accepted method of identifying things that would satisfy all requirements of the existing I关键词: Internet of things; identification; digital object architecture; handle system; security
收藏原文链接
Journal
摘要: Protecting the privacy of data in the multi-cloud is a crucial task. Data mining is a technique that protects the privacy of individual data while mining those data. The most significant task entails obtaining data from numerous remote databases. Mining algorithms can obtain sensitive information once the data is in the data warehouse. Many traditional algorithms/techniques promise to provide safe data transfer, storing, and retrieving over the cloud platform. These strategies are primarily conc关键词: Data mining; cryptography; privacy preserving; elliptic curve; information security
收藏原文链接
Journal
摘要: BACKGROUND(#br) Despite South Africa being an upper middle-income country producing enough food to sustain its population, and having an advanced social welfare system, it has high levels of food insecurity at the household-level. Food insecurity is linked to malnutrition and undernutrition in children. This manuscript addresses gaps in knowledge about food choices and practices of primary caregivers of children in receipt of South Africa's largest cash transfer programme, the Child Support Gran关键词: Child support grant;cash transfers;child nutrition;food choices;food security;foodways
收藏原文链接
Journal
摘要: BACKGROUND(#br) Bangladesh has achieved notable economic progress in recent decades while economic inequality increased. Special attention is warranted on the ultra-poor population of the country. An 18 month-long economic development program, designed based on an ultra-poor graduation approach, was implemented to alleviate poverty and improve child nutrition in rural Bangladesh. (#br)OBJECTIVE(#br) The study examined the impact of livelihood components of an economic development program on outc关键词: Ultra-poor population;food security;graduation approach;livelihood program;poverty eradication
收藏原文链接
Journal
摘要: Harsh weather patterns that are unpredictable owing to climate change, remoteness, dependence on food imports and limited local food production place Arctic and Subarctic food systems under serious pressure. The model of food sovereignty provides a surprisingly interesting contribution to address the food insecurity in these regions; it promotes long-term stable provision of healthy foods (sustainable) that are accessible to all (equity) and fosters local food production-consumption patterns (lo关键词: Food security;agriculture;food sovereignty;food system;subarctic;yukon
收藏原文链接
Journal
摘要: With the known evidence that potential connected vehicle (CV) users are worried about sharing data because of the associated data privacy and security issues, this study investigates the importance of the reputation of the data manager (who collects, stores, and owns the data) of CV technology (CVT). Based on a questionnaire survey of 2400 US adults, this study asserts that the data manager's reputation has a significant impact on the public perception of data privacy and security issues in CVT 关键词: Connected vehicle;Data privacy;Data security;Reputation;Data manager;Acceptance
收藏原文链接
Journal
Rani Sarkar Mukta;Rashid Md. Harun-or;Rahman Aminur;Kafi Md. Abdul;Hosen Md. Ismail;Rahman Md. Shahidur;Khan M. Nuruzzaman;
摘要: Battle with the adverse impact of climate change on the agricultural productivity and susceptibility of the crops is of premier importance for ensuring food security and sustained agricultural developments. The agro-nanotech innovations offer “low input but maximum output” based agro-farming are well aligned with the desired crops production. This review is designed to summarize the current technical innovations, advantages, challenges, and future perspectives of nanotechnology as a means of imp关键词: FAO;BTU;SDG;USDA;Engineered-nanomaterials;Precision-agriculture;Soil remediation;Nanofertilizer;Nanopesticide;Crop protection;Food security
收藏原文链接
Journal
摘要: Cognitive biases are consistent and predictable mental errors caused by our simplified information processing strategies. Some cognitive-ecological biases have a negative and specific impact on the organization of Intelligence Communities and in particular on the mechanisms of integration of competencies between Medical and Cyber Intelligence, and they represent a serious threat to Cyber security. The spread of these systematic errors is practically ubiquitous and most, if not all, Intelligence 关键词: Cognitive-ecological bias;Biological threats;Psychological threats;Medical Intelligence;Fluid mosaic model;Cyber security
收藏原文链接
Journal
Sinclair Kate;Thompson-Colón Theresa;Bastidas-Granja Alexandra Milena;Del Castillo Matamoros Sara Eloísa;Olaya Eucaris;Melgar-Quiñonez Hugo;
SSM - Qualitative Research in HealthVolume 2, Issue , 2022, PP
摘要: There is a growing consensus that women's autonomy is positively related to food security. However, the evidence is inconsistent, and the nature of the pathways connecting the two factors remains unclear.(#br)Objective(#br)To analyze the connection between women's autonomy and food security drawing from the perspective of rural Indigenous women in Nariño, Colombia.(#br)Methods(#br)Focus group discussions and photovoice were conducted with 24 women.(#br)Results(#br)Women elucidated numerous econo关键词: Food security;Women's autonomy;Colombia;Indigenous;Photovoice;Participatory action research
收藏原文链接
Journal
摘要: Industrial Internet of Things (IIoT) denotes a network of interlinked sensors, instruments, and other devices for industrial applications in the domains of manufacturing, logistics, transportation, etc. IIoT security is a major crucial research area for several applications. Image encryption techniques gained popularity in the recent years, thanks to increasing requirements for secure image transmission in IIoT environments. At the same time, conventional security solutions built for sensitive d关键词: Internet of Things;Security;Shark smell optimization;Self diffusion;Hopfield Chaotic Neural Network
收藏原文链接
Journal
摘要: Smartphones have become an integral part of our daily lives thanks to numerous reasons. While benefitting from what they offer, it is critical to be aware of the existence of malware in the Android ecosystem and be away from them. To this end, an end-to-end and highly effective Android malware detection framework based on CNN, namely, DroidMalwareDetector, was proposed within this study. Unlike most of the related work, DroidMalwareDetector was specifically designed to (i) automate feature extra关键词: Android;Android malware detection;Deep neural network;Convolutional neural network;Mobile security
收藏原文链接
Journal
Samanta Palas;Dey Sukhendu;Ghosh Apurba Ratan;Kim Jang Kyun;
AquacultureVolume 560, Issue , 2022, PP
摘要: Aquaculture has emerged as fastest-growing global food production sector and played a pivotal role in meeting increased animal protein requirement. However, chemical pollution, environmental deterioration and disease prevalence has raised concern about aquaculture sustainability as well as achieving global food security. Nanoparticle nutraceuticals has tremendous potential to cope with these challenges and revolutionize aquaculture sector. The nanoparticle nutraceuticals concept is widely used t关键词: Aquaculture;Nanoparticle nutraceuticals;Drug delivery;Global food security;Disease prevention;Water quality management
收藏原文链接
Journal
摘要: The grid power supply in many developing countries is insufficient and irregular resulting in many commercial users relying on inefficient and air pollution intensive off-grid captive diesel generators (DGs) as a backup power supply. This study investigates the fuel consumption and emission level of such DGs and explores the possibility of reducing them through the formation of a microgrid of DGs and solar PV in a commercial area in Kathmandu, Nepal. An optimized microgrid system has been design关键词: Solar;Captive power generation;Microgrid;Energy security;Air pollutants;Commercial sector
收藏原文链接
Journal
摘要: The countries along the “Belt and Road” are important cooperation regions for China's agricultural trade. The examination of agricultural trade competitiveness and its influencing elements between China and nations along the “Belt and Road” serves as a guide for China's international agricultural cooperation with these countries. The competitiveness of agricultural goods trade between China and nations along the “Belt and Road” was estimated using the MS index, RSCA index, CA index, and TC index关键词: Belt and Road;Agricultural products;Trade competitiveness;Food security;Double cycle
收藏原文链接
Journal
摘要: Because of the process of rapid urbanization in China, the urban waterlogging problems are becoming more prominent. Reasonable construction of rainstorm security pattern is an important means to realize urban sustainable rainstorm management. Using SCS-CN hydrological model, GIS hydrological analysis module and GIS spatial coupling method, we evaluated the safety space of the watershed, determined the spatial positioning of the inundated area, and finally constructed the rainstorm security patte关键词: Rainstorm security pattern;Urban waterlogging;SCS-CN hydrological model;GIS;Land use strategy
收藏原文链接
Journal
Mehic Miralem;Duliman Mugdim;Selimovic Nejra;Voznak Miroslav;
Alexandria Engineering JournalVolume 61, Issue 11, 2022, PP 8997-9009
摘要: With the development of electronics and communication techniques, the interest in realizing sensor networks with a large number of end nodes is growing. The main idea is to install devices in remote locations without direct supervision, which requires an uninterrupted power supply and secure communication to the rest of the network. In this paper, an experimental comparative analysis of popular practical LoraWAN end nodes (WisNode RAK811 and Seeeduino SX1301) regarding energy consumption in diff关键词: LoraWaN;Eenergy;Security;Networks;IoT
收藏原文链接
Journal
摘要: Distributed wind and photovoltaic (PV) power generation are boosting in China. The wide integration of these generators into the distribution network leads to the risk of branch overload and bus voltage violation. To cope with the above risk, some peak output of wind turbines and PV equipment may be curtailed. Although curtailment measure leads to the increase of wind and PV power generation cost, more wind and PV electricity can be integrated into distribution network. In order to balance the p关键词: Economic consumption;Maximum and minimum optimization planning model;Steady-state security region of distribution network;Linear programming model;Curtailment measure;Distributed generation
收藏原文链接
Journal
摘要: With the increasing penetration of renewables into the AC–DC hybrid distribution system, it is necessary to develop a security-constrained planning approach to address the uncertainty brought by renewables. Motivated by the urgent need to accommodate high penetration of renewable energy resources in weak grids, this paper presents a novel planning approach for AC–DC hybrid distribution systems considering the N-1 security criterion. Network reconfiguration is incorporated as a method to improve 关键词: Distribution system expansion planning;Hybrid AC–DC;Network reconfiguration;N-1 security criterion;Contingency screening
收藏原文链接
Journal
摘要: With the increasing penetration of wind power, probabilistic transient stability assessment becomes critical to deal with the uncertainties and correlations of wind power, thus improving the reliability of power system. This paper proposes an improved multi-point estimation based probabilistic transient stability assessment method. Extreme learning machine (ELM) is introduced to describe the uncertainty of practical wind power output. Gauss-Hermite integral based multi-point estimation method is关键词: Gauss-Hermite integral;Multi-point estimation;Practical dynamic security region;Probabilistic transient stability assessment
收藏原文链接
Journal
摘要: With increasing distributed energy resources (DERs) integration, the strategic behavior of a DER aggregator in electricity markets will significantly affect the secure operation of the distribution system. In this paper, the interactions among the DER aggregator, energy and reserve markets, and distribution system are investigated through a single-leader-multi-follower Stackelberg game model with the DER aggregator as the leader and the independent system operator and distribution system operato关键词: Distributed energy resource;Energy and reserve markets;Security check;Stackelberg game;Bi-level reformulation and decomposition;Linearized power flow model
收藏原文链接
回到顶部