We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Risk Prediction Techniques for Power Control System Network Security

    As a fundamental energy infrastructure, the power system has a direct impact on people’s daily lives and production. If the security of the...

    Article 18 April 2024
  2. Data creation techniques and data-oriented models for dynamic security assessment of power system

    Advances in data-oriented artificial intelligence approaches open up the power system dynamic security assessment using machine learning (ML) models....

    Mahesh Pal Singh, Nidul Sinha in Electrical Engineering
    Article 21 March 2024
  3. An innovative privacy preservation and security framework with fog nodes in enabled vanet system using hybrid encryption techniques

    Effective communication between smart transportation and smart vehicles is carried out using Vehicular Ad-Hoc Networks (VANETs). Here, the VANET...

    M. S. Minu, P. Jona Innisai Rani, ... A. Rajesh in Peer-to-Peer Networking and Applications
    Article 18 April 2024
  4. Cloud data transmission based on security and improved routing through hybrid machine learning techniques

    A shared environment and the computer paradigm are combined in cloud computing (CC), enabling multiple users to access services and resources. This...

    Shamimul Qamar, Mohd Amaan, ... Shadab Alam in Soft Computing
    Article 16 May 2023
  5. Security and privacy of digital economic risk assessment system based on cloud computing and blockchain

    The digital economy constantly evolves and blockchain technology has become crucial in assessing risks. The security of the economic sector is of...

    Wen** ** in Soft Computing
    Article 10 January 2024
  6. Boxless bus bar system for distribution boxes: a novel design for efficiency, security, and reliability

    Conventional distribution boxes, with their bulky size, inefficiency, and susceptibility to security breaches, pose significant challenges for power...

    Article 03 May 2024
  7. Design of Computer Network Security Defense System Based on Artificial Intelligence and Neural Network

    In order to improve the effect of computer security defense, this paper applies artificial intelligence technology and neural network technology to...

    Article 28 August 2023
  8. Design of Intelligent Software Security System Based on Spark Big Data Computing

    With the rapid development of computer science and technology, the Internet has penetrated into various fields of society and economy. However, there...

    Chong Xu, **g Li in Wireless Personal Communications
    Article 16 April 2024
  9. Application of decision system design based on improved association rules in rural social security

    The establishment of rural social security decision-making system is crucial for people's social welfare. The Spark algorithm is employed to filter...

    Article 18 December 2023
  10. Enhancing Security and Privacy in Small Drone Networks Using 6G-IOT Driven Cyber Physical System

    The purpose of this abstract is to present a concise summary of a study that sought to enhance the cybersecurity of 6G-IoT drone devices through the...

    Nagarjuna Tandra, C. N. Gireesh Babu, ... S. Ravichandran in Wireless Personal Communications
    Article 17 May 2024
  11. An Interactive Visualization System for Network Security Data

    Data visualization is an important approach for data analysis, which can reveal the patterns and characteristics of complex datasets through visual...

    Li Zheng, Gang Yu, Yuntian Zheng in Journal of Signal Processing Systems
    Article 31 January 2023
  12. Network information security and legal management based on embedded real-time task processing and high-frequency acquisition system

    The Vx Works system can meet the requirements of real-time, multi-task scheduling and high software reliability, but because the system is protected...

    Article 25 September 2023
  13. Securing Big Data: Current Challenges and Emerging Security Techniques

    The term big data (BD) refers to the massive amounts of different types of data generated every day. Valuable data and insights can be extracted by...
    Ikram Hamdaoui, Khalid El Makkaoui, Zakaria El Allali in Artificial Intelligence, Data Science and Applications
    Conference paper 2024
  14. IoT Security Using Machine Learning Techniques

    Internet of things (IoT) devices that integrate into networks should provide increasingly sophisticated services that must protect security and...
    R. Ganesh Babu, S. Markkandan, ... V. Kaviya in Cyber Technologies and Emerging Sciences
    Conference paper 2023
  15. Robot-Based Security Management System for Smart Cities Using Machine Learning Techniques

    Recently, smart cities are develo** more slowly, gathering plenty of data and communication skills to improve service worth. Despite the smart city...
    Ahmad Qasim Mohammad AlHamad, Samer Hamadneh, ... Barween Al Kurdi in Cyber Security Impact on Digitalization and Business Intelligence
    Chapter 2024
  16. A novel spectrogram visual security encryption algorithm based on block compressed sensing and five-dimensional chaotic system

    Based on block compressed sensing theory, combined with a five-dimensional chaotic system, we propose and analyze a novel spectrogram visual security...

    Fabao Yan, Yupeng Shen, ... Yanrui Su in Nonlinear Dynamics
    Article 25 February 2023
  17. GAN4IP: A unified GAN and logic locking-based pipeline for hardware IP security

    Intellectual property (IP) security has emerged as a critical concern in semiconductor industries. In the domain of hardware IP security, logic...

    Jugal Gandhi, Diksha Shekhawat, ... Jai Gopal Pandey in Sādhanā
    Article 05 May 2024
  18. Challenges and Potential Approaches in Wireless Sensor Network Security

    A remarkable new technology called a wireless sensor network offers communication services for environmental monitoring and target tracking for the...

    Article 22 December 2023
  19. A study on building awareness in cyber security for educational system in India using interpretive structural modellings

    The aim of this study to find out awareness of cyber security education in India. This Study applies unifies theory model named Interpretive...

    Sachi Nandan Mohanty, Tilottama Singh, ... Rakesh Kumar in International Journal of System Assurance Engineering and Management
    Article 29 February 2024
  20. Fog computing-based IoT-enabled system security for electrical vehicles in the smart grid

    Wireless sensor networks (WSNs) face significant challenges related to dependability, integrity, and confidentiality due to their widespread...

    Sanjay Kumar Sonker, Vibha Kaw Raina, ... Ramesh C. Bansal in Electrical Engineering
    Article 09 February 2024
Did you find what you were looking for? Share feedback.