期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Unified Computational Modelling for Healthcare Device Security Assessment
1
作者 Shakeel Ahmed Abdulaziz Alhumam 《Computer Systems Science & Engineering》 SCIE EI 2021年第4期1-18,共18页
This article evaluates the security techniques that are used to maintainthe healthcare devices, and proposes a mathematical model to list these in theorder of priority and preference. To accomplish the stated objectiv... This article evaluates the security techniques that are used to maintainthe healthcare devices, and proposes a mathematical model to list these in theorder of priority and preference. To accomplish the stated objective, the articleuses the Fuzzy Analytic Network Process (ANP) integrated with Technical forOrder Preference by Similarities to Ideal Solution (TOPSIS) to find the suitablealternatives of the security techniques for securing the healthcare devices fromtrespassing. The methodology is enlisted to rank the alternatives/ techniquesbased on their weights’ satisfaction degree. Thereafter, the ranks of the alternatives determine the order of priority for the techniques used in healthcare security.The findings of our analysis cite that Machine Learning (ML) based healthcaredevices obtained the highest priority among all the other security techniques.Hence the developers, manufacturers and researchers should focus on the MLtechniques for securing the healthcare devices. The results drawn through theaid of the suggested mathematical model would be a corroborative referencefor the developers and the manufacturers in assessing the security techniques ofthe healthcare devices. 展开更多
关键词 Medical devices fuzzy-ANP.TOPSIS security techniques machine learning
下载PDF
Security of Computer Network and Measures of Defense
2
作者 何德明 《电脑知识与技术(过刊)》 2011年第7X期4819-4824,4837,共7页
Along with the deepening of the reform and opening-up policy and the entering of the WTO,international exchange of economy and culture has become more and more frequent,Internet has become an indispensable part of our... Along with the deepening of the reform and opening-up policy and the entering of the WTO,international exchange of economy and culture has become more and more frequent,Internet has become an indispensable part of our life,its rapid development brings great convenience to us,and all of the computers will be connected by Internet in the 21 century,thus the meaning of information security has changed substantially.It not only changes from a general guarding to a common defence,but from a specific field to a public subject as well.However,the opening and sharing of the Internet resource,unefficient supervision as well as various virus make people's information and belongings being in an extremely dangerous environment.The fight between hackers and anti-hackers,destruction and anti-destruction has already affected the stable running of the network and users' legal right,caused great economy damages and it could also threat our country's security.So a right understanding and in-time measures should be paid special attention to.The thesis firstly expatiates the current state of the network security and its importance,and discusses some major factors and threats that affect the network security.And the thesis also introduce some catalogues of the security techniques,some relevant information and their major characters,besides that,I enumerate some popular and effective methods of protecting our network,including the widely used firewall,and the meticulous techniques such as security scan techniques and techniques of intrusion detection.Lastly,some protective measures are stated. 展开更多
关键词 Network security FIREWALL security scan techniques techniques of intrusion detection prevention Strategy
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部