The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security in wireless sensor networks (WSNs) is very important. Traditional security schemes abandon compromised nodes and add a lot of redundancies to make the network resilient. These methods are not applicable to resource-limited WSNs. This paper proposes an adaptive and active defense mechanism with low power consumption. In our scheme, some nodes are configured as monitoring nodes to identify...
The affiliation of stability and security is discussed. It is point out that the static security restrains, transient stability restrains and whole process security assessment should be deal with under different procedures in power grid planning. The procedure of security assessment for power grid planning under high penetration of variable generation is presented. It is point out that a part of the...
The research of Network security situational awareness (NSSA) is very important because it can improve the network monitoring abilities, Emergency response capacity and predict the development trend of network security. Based on the concept model of situational awareness, This paper expounds on the situational awareness of the three main research content: extraction the factors of NSSA, situation...
Cloud computing, which has emerged as one of the most influential paradigms in the IT industry in recent years, is powered by the concept of virtualization technology. For achieving energy efficiency, load balancing and high availability of physical server in Cloud Data Center, the virtual machines should be migrated from one physical server to another. During the migration process, some steps should...
With the advent of technology and the rapid development of network applications, network security issues become a priority need to consider a variety of network applications, in a variety of spoofing attacks, how to prevent spoofing TCP session hijacking became the focus of network intrusion prevention one. This article first explains the concept of TCP session hijacking, and its principle and the...
The importance of sensitive information carried and exchanges by wireless sensors in many applications helped develop a plethora of protocols and algorithms essentially to secure data for their aggregation in wireless sensor networks (WSNs), among which the the elliptic curve cryptography (ECC) with homomorphic properties allowing users to execute operations on encrypted metrics values. From the low...
In order to improve the data communication security of the channel between the tag and the reader of Radio Frequency Identification (RFID) technology, this article designs a mutual security authentication protocol aiming at illegal access, tracking, wiretap and other attack technologies. The Protocol adopts SM4 encryption algorithm to encrypt communication data, and the communication data contain...
To solve the trustworthiness of reusable test cases, a trustworthiness framework of reusable test cases is proposed in this paper, including the analysis of trustworthiness attributes and trustworthiness evidence. Furthermore, the trustworthiness assurance processes related are presented to support management activities of reusable test case.
CAPTCHA (also known as verification code) is mainly used to guarantee the login security of the interactive websites. At present, the most popular verification code is image CAPTCHA which can distinguish the human user from the computer by identifying characters in the image. Although the image CAPTCHA is safe at beginning, great deals of CAPTCHAs have been cracked by the computers along with the...
This article research on the DC access grid security and stability analysis. It combed the stability and security of electrified weak link, revealing the power grid dynamic characteristics of evolution mechanism. It study and formulation of reservoir in the power grid security and stability control strategy of DC power transmission system, the access of power grids in Tibet, AC / DC hybrid power grid...
Visible Management System is designed based on system controller, running fire, patrol checking and visible management software. Wireless and network link between LED end device and control unit are setup, making dangerous chemistry location produce management visible, enable employee discover security problem and unexceptional phenomenon earlier. As a result, management is dynamic, effective, and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.