Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
A cyber-physical system (CPS) is an integration process between the cyber-world and the physical world. Because the cyber-world affects the physical world with actuators, CPS security is crucial. Limited by characteristics of low computation power and small storage capacity of embedded devices, cloud computing is enabling technology to provide computation resources. As a result of complexity and diversity...
To improve the information security level of the wide area protection system, the functions of the system and IED are analyzed. The communication data types of the system and their communication requirement are offered. The main security threatens and key information security technologies are analyzed emphatically. The key information security technologies include digital signature technology, encryption...
To improve the ability of system providing service when encounter malicious invasion, a new model of tolerance invasion system is given based on dynamic threshold encryption. The real-time detection of the model is realized by the Collaboration between servers and hosts. The sensitive data in the system apply dynamic threshold encryption, and can change their share with the distribution. The model...
The following topics are dealt with: securware; authentication protocol; data privacy; information security; intrusion detection; data security; authorisation; role-based access control; malware; cryptography and network security.
The following topics are dealt with: availability, reliability and security; distributed systems and grid; SOA security; enterprise security; intrusion and fraud detection; digital forensics and security in communication; cryptography; software security; privacy and trust; dependable systems and trusted computing; authentication and authorization; security & privacy enhancement in data warehouses;...
In an e-enterprise, the tight coupling between business process and the underlying information technology infrastructure amplifies the effect of hardware and software security failures. This accentuates the need for comprehensive security management of the infrastructure. This paper outlined the challenges posed by fulfilling myriad security requirements throughout the various stages of enterprise...
Password authentication is a common approach to system security. The conventional verification table approach has significant drawbacks. Recently, neural networks have been used for password authentication to overcome the shortcomings of traditional approaches. In neural network approaches to password authentication, no verification table is needed; rather, encrypted neural network weights are stored...
Notice of Violation of IEEE Publication Principles"An Intrusion Detection Architecture for Ad hoc Network Based on Artificial Immune System"by Hongxia Xie and Zhengyun Huiin the Proceedings of the 7th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06), Taipei, Taiwan, Dec. 2006After careful and considered review of the content and authorship...
Location or mobility information of nodes, GPS information, load, link change rate, and routing information, etc., have been used for security purposes for wireless networks, such as intrusion detection in ad hoc networks. However, existing intrusion detection approaches usually focus on one of the aspects of nodes to detect statistical anomaly or malicious signatures. In this paper, a new model is...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.