The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many of the industries such as manufacturing, F&B, transportation have recently shown a growing interest in Industry Internet of things (IIoT) to gain competitive advantage. The IIoT is technology stack of combining internet of things, machines, computers and people enabling intelligent business transformational through advanced big data analytics. With the growing complexity of IIoT in a large-scale...
Wireless Sensor Networks (WSNs), deployed in distributed Internet of Things (IoT) applications, measure data, process, exchange information, and function collaboratively with other sensor nodes and end-users, which can be internal or external to the network. To maintain the reliable connectivity and the accessibility of distributed IoT, it is vital to establish secure links for end-to-end communication...
With the increasing of mobile devices, Device-to-Device(D2D) communication is considered as a promising technology for achieving direct communication of devices. But the security issues still remain to be solved. In this paper, We utilize D2D communication between UEs in proximity to share epidemic media contents. We propose a Secure Content Sharing Protocol(SCSP) that combine with the credibility...
In 2013, Tams et al. proposed a method to determine directed reference points in fingerprints based on a mathematical model of typical orientation fields of tented arch type fingerprints. Although this Tented Arch Reference Point (TARP) method has been used successfully for pre-alignment in biometric cryptosystems, its accuracy does not yet ensure satisfactory error rates for single finger systems...
In this paper, the concept named SocialStegDisc was introduced. This concept is as an application of the original idea of StegHash method which uses multimedia files as a carrier of hidden information and connects them logically with a mechanism of hashtags. SocialStegDisc is a new kind of mass-storage characterized by unlimited space and provides the set of operations on files: creation, reading,...
Cloud computing is a technology that facilitates numerous configurable resources in which the data is stored and managed in a decentralized manner. However, since the data is out of the owner's control, concerns have arisen regarding data confidentiality. Encryption techniques have previously been proposed to provide users with confidentiality in terms of outsource storage; however, many of these...
Restricted by the localization management and other factors, the social security level of the floating population in China is quite different. This study used the 2014 national population dynamic monitoring data, employment and living conditions, social insurance, housing and living conditions, public health and health conditions of the four first level indexes and two stage grey clustering model...
Determining threshold values of key economic security indices describing an economic situation in any country is an important stage in the assessment of the country's economic stability. Threshold values must be periodically reevaluated due to their continuous deterioration as far as the global economic environment is undergoing changes. The authors offer a rough estimate method for achieving this...
Information is a valuable asset for the Governments institution, especially when the organization is carrying most important information, such as weather and natural disaster. The need for safeguards against information becomes very necessary issue for such organization. One standard that can be used to measure the maturity level of information security in an organization is the KAMI index developed...
In order to solve the problem of China's auto industry control right caused by the introduction of foreign capital, based on defining China's auto industry capital structure security, in this paper we construct China's auto industry capital structure security index system containing 6 indexes, identify the index warning limit and index positive management method and finally use the principal component...
Happiness is affected by subjective feelings and objective conditions. While the health, wealth risks and so on that come along with serious diseases are important indexes affecting each factor of sense of happiness. It needs to build up happiness index to measure the influence of serious disease on happiness index of rural residents. The attained data conclusions have proposed optimized and improved...
Based on the financial security index calculated in the method of principal component analysis, this paper applies the model of BP neural network to test the result and then puts forward the early warning of Chinese financial security position in the future. In addition, the article gives some following suggestions for the early warning of financial risks: we shall reform the current financial regulation...
In this paper, we construct the financial risk early warning model based on BP neural network, make an empirical analysis of the data between January 2004 and October 2015, proves the reliability of the model prediction results through the training and test of the financial risk early warning model and finally put forward the following suggestions for preventing China's financial risks under the new...
In order to improve the electric car battery safety early warning ability and decrease the safe accident of electric vehicle charging, the electric vehicle charging safety factors are analyzed, the security early warning index selection ways and methods are studied, and a security early warning evaluation index system is set, the evaluation method of weight for safety index is discussed. Besides,...
The security situation of China's futures industry is currently in good condition on the whole, with strong industrial competitiveness and control force, as well as low external dependency. However, under the new normal, there still exist some problems, such as fewer trading varieties of futures, irrational investor structure and the slow internationalization process and so on. So we must accelerate...
There is an ever-increasing interest in studying temporal networks nowadays, as temporal networks can illustrate the real-world system more accurately. To date, how to characterize nodes' importance is still unclear in temporal networks. In this work, we first use a time window graph model to cut the temporal network into slices, and then we give an indicator for network centrality according to the...
Security issues in the IoT based CPS are exacerbated with human participation in CPHS due to the vulnerabilities in both the technologies and the human involvement. A holistic framework to mitigate security threats in the IoT-based CPHS environment is presented to mitigate these issues. We have developed threat model involving human elements in the CPHS environment. Research questions, directions,...
Searchable Symmetric Encryption (SSE) allows users to execute encrypted queries over encrypted databases. A large number of SSE schemes have been proposed in the literature. However, most of them leak a significant amount of information that could lead to inference attacks. In this work, we propose an SSE scheme for a Privacy-preserving Multi-cloud encrypted Database (P-McDb), which aims at preventing...
A new fast static security analysis algorithm, based on the interval analysis theory and probability theory, is proposed to improve the efficiency and accuracy of security analysis during power network interaction. In this paper, the characteristics of network interaction and uncertainty in the interaction process are illustrated firstly. After that the dimension reduction technique is employed in...
Recent advances in Intrusion Risk Assessment (IRA) have brought promising solutions to enhance Intrusion Response Systems (IRS). However, current researches lack reasonable solutions to exploit system state information. Without the system state, the IRA results may suffer from the high false rate of Intrusion Detection Systems (IDS). To address this limitation, we propose a novel State-Aware Risk...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.