The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid development of computer network technology, the security of computer network becomes increasingly important. Three main threats facing computer network security include: hackers, computer virus and denial of service attack. Things leading to the safety of the network are mainly: resources sharing, data communication, computer virus and TCP/IP protocol security flaws. A safety network...
Computer network is playing an active role in modern business management in power system. Nowadays, information power industry develops rapidely, highlighting the growing importance of information security, and the challenges are increasingly serious. This paper analyzes security risks in power enterprise network and proposes specific corresponding strategies.
With the development of computer network and information technology rapidly, they are serving every walk of life in China. Chinese government is using widely the information and network technology for improving its work. So, Chinese E-Government information system is developing feetly. However, in fact, E-Government information system has some its characters and some potential hazards in China, which...
Computer network has been in increasingly rapid development in recent years especially the prevalence of the Internet. The information exchange and transmission among the computers have become the inevitable trend in contemporary society. At the same time, information security also becomes the hot topic and is more significant in computer network. When the problems of information security are emerging,...
Computer viruses are great threats to the operating system and the computer network. In order to handle those emergent situations might appear in the future and make corresponding policies immediately; thorough researches of computer virus propagation are very important and urgently needed. But the spreading methods of computer viruses are different; one simple model is unable to describe all the...
The rapid development of computer network sets off a global wave of enterprise informatization. Enterprisespsila cross-regional telecommuting and internal information sharing platform are more and more dependent on the networks. However, the Internetpsilas open communication protocol and the limitations of the original design lead to increasingly serious problem of Internet security, and it caused...
The following topics are dealt with: Web service; computer network; information processing; machine learning; mobile commerce; cryptography; information security; risk analysis; electronic commerce; electronic payment; innovative e-business model; enterprise integration application; information hiding and watermarking; intelligent system and international finance.
With the development of the computer network and the message expansion over the Internet, information security is becoming increasingly important. The technology of embedding audio watermark into an audio signal was researched in the DWT domain and an algorithm of additive audio watermarking based on SNR adaptive to determine a scaling parameter is proposed in this paper. The intensity of embed watermark...
There are a number of techniques and pieces of hardware and software aimed at promoting information security. In the present paper it is presented a security system dynamically reconfigurable in FPGAs. SSDR presents a robust architecture, which enables the implementation of specific and general security policies in order to guarantee services such as confidentiality, authenticity, integrity, availability,...
There are a number of techniques and pieces of hardware and software aimed at promoting information security. In the present paper it is presented a security system dynamically reconfigurable in FPGAs. SSDR presents a robust architecture, which enables the implementation of specific and general security policies in order to guarantee services such as confidentiality, authenticity, integrity, availability,...
Dispatching managements information system (DMIS) receives real-time data from real-time systems and provides service for outer systems. Advanced technologies of network security are expected to be adopted in power system, whereas need modifying so as to be adaptable to real-time requirements. Compatible measures that should be taken to eliminate the insecure potential hazards now existing in DMIS...
Information security is always a major problem for administrators and computer professionals in MIS (management information systems). It is becoming more severe, especially in today's networked environments. Either the manager or the computer professional staff have exhausted various methods for solving this problem. Generally speaking, information security is a composite and systematic problem, which...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.