期刊文献+
共找到348,749篇文章
< 1 2 250 >
每页显示 20 50 100
Research on Network Security Level Protection Measurement Strategy in the Context of Cloud Platforms
1
作者 Lin Ma 《Journal of Electronic Research and Application》 2024年第3期221-229,共9页
Platforms facilitate information exchange,streamline resources,and reduce production and management costs for companies.However,some viral information may invade and steal company resources,or lead to information leak... Platforms facilitate information exchange,streamline resources,and reduce production and management costs for companies.However,some viral information may invade and steal company resources,or lead to information leakage.For this reason,this paper discusses the standards for cybersecurity protection,examines the current state of cybersecurity management and the risks faced by cloud platforms,expands the time and space for training on cloud platforms,and provides recommendations for measuring the level of cybersecurity protection within cloud platforms in order to build a solid foundation for them. 展开更多
关键词 Cloud platform Cyber security Level protection measurement
下载PDF
Research on College Network Information Security Protection in the Digital Economy Era
2
作者 Libin Zhang 《Proceedings of Business and Economic Studies》 2024年第2期132-137,共6页
In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the p... In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference. 展开更多
关键词 Digital economy Universities and colleges Network information security protection status COUNTERMEASURES
下载PDF
Modeling and Implementation of a Data Security and Protection Medium Using the Generated Key Based on Electromagnetic Wave Propagation Theories
3
作者 Vincent Mbonigaba Fulgence Nahayo +3 位作者 Octave Moutsinga Dieudonné Okalas-Ossami Romeo Nibitanga Thérence Niyonsaba 《Journal of Computer and Communications》 2024年第9期131-140,共10页
Today, the advent of quantum computers and algorithms is calling into question the semantic security of symmetrical and asymmetrical cryptosystems. The security of objects connected to the network, which must provide ... Today, the advent of quantum computers and algorithms is calling into question the semantic security of symmetrical and asymmetrical cryptosystems. The security of objects connected to the network, which must provide a security service and protect the privacy of users by providing protection against attacks such as identity theft, denial of service, eavesdropping and unauthorised access to personal and sensitive data. It is therefore necessary to find a robust method of using the key that is effective in protecting and preventing data tampering. In this paper, we design and implement a security and data protection method using a key generated on the basis of electromagnetic wave propagation theories. Modelling and implementation of a data security and protection method using a key generated on the basis of electromagnetic wave propagation theories. 展开更多
关键词 MODELING security CRYPTOGRAPHY Algorithm CODING Quantum Post Bytes System WAVES
下载PDF
Review on application progress of federated learning model and security hazard protection 被引量:2
4
作者 Aimin Yang Zezhong Ma +5 位作者 Chunying Zhang Yang Han Zhibin Hu Wei Zhang Xiangdong Huang Yafeng Wu 《Digital Communications and Networks》 SCIE CSCD 2023年第1期146-158,共13页
Federated learning is a new type of distributed learning framework that allows multiple participants to share training results without revealing their data privacy.As data privacy becomes more important,it becomes dif... Federated learning is a new type of distributed learning framework that allows multiple participants to share training results without revealing their data privacy.As data privacy becomes more important,it becomes difficult to collect data from multiple data owners to make machine learning predictions due to the lack of data security.Data is forced to be stored independently between companies,creating“data silos”.With the goal of safeguarding data privacy and security,the federated learning framework greatly expands the amount of training data,effectively improving the shortcomings of traditional machine learning and deep learning,and bringing AI algorithms closer to our reality.In the context of the current international data security issues,federated learning is developing rapidly and has gradually moved from the theoretical to the applied level.The paper first introduces the federated learning framework,analyzes its advantages,reviews the results of federated learning applications in industries such as communication and healthcare,then analyzes the pitfalls of federated learning and discusses the security issues that should be considered in applications,and finally looks into the future of federated learning and the application layer. 展开更多
关键词 Data silos Machine learning Federated learning Privacy protection Learning framework
下载PDF
Factors Influencing Employees on Compliance with Cybersecurity Policies and Their Implications for Protection of Information and Technology Assets in Saudi Arabia
5
作者 Sami Saad Alsemairi 《Intelligent Information Management》 2023年第4期259-283,共25页
In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely ... In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely on technical solutions for defense, since many cyber attacks attempt to exploit non-technical vulnerabilities such as how well employees comply with the organization’s cybersecurity policies. This study surveyed 245 randomly selected employees of government organizations in the Kingdom of Saudi Arabia with an electronically distributed questionnaire about factors that influence employees’ compliance with cybersecurity policies. The study found that ethical factors had the most influence on employee compliance with cybersecurity policies, followed in decreasing order of influence by legislative factors, technical factors, and administrative factors. 展开更多
关键词 Cybersecurity Policies COMPLIANCE protection Information and Technology Assets
下载PDF
A Lightweight ABE Security Protection Scheme in Cloud Environment Based on Attribute Weight
6
作者 Lihong Guo Jie Yang Haitao Wu 《Computers, Materials & Continua》 SCIE EI 2023年第8期1929-1946,共18页
Attribute-based encryption(ABE)is a technique used to encrypt data,it has the flexibility of access control,high security,and resistance to collusion attacks,and especially it is used in cloud security protection.Howe... Attribute-based encryption(ABE)is a technique used to encrypt data,it has the flexibility of access control,high security,and resistance to collusion attacks,and especially it is used in cloud security protection.However,a large number of bilinear mappings are used in ABE,and the calculation of bilinear pairing is time-consuming.So there is the problem of low efficiency.On the other hand,the decryption key is not uniquely associated with personal identification information,if the decryption key is maliciously sold,ABE is unable to achieve accountability for the user.In practical applications,shared message requires hierarchical sharing in most cases,in this paper,we present a message security hierarchy ABE scheme for this scenario.Firstly,attributes were grouped and weighted according to the importance of attributes,and then an access structure based on a threshold tree was constructed according to attribute weight.This method saved the computing time for decryption while ensuring security and on-demand access to information for users.In addition,with the help of computing power in the cloud,two-step decryption was used to complete the access,which relieved the computing and storage burden on the client side.Finally,we simulated and tested the scheme based on CP-ABE,and selected different security levels to test its performance.The security proof and the experimental simulation result showthat the proposed scheme has high efficiency and good performance,and the solution implements hierarchical access to the shared message. 展开更多
关键词 Attribute-based encryption cloud security message hierarchy attribute weight access control
下载PDF
Cybersecurity and Privacy Protection in Vehicular Networks (VANETs)
7
作者 Bruno Macena Celio Albuquerque Raphael Machado 《Advances in Internet of Things》 2023年第4期109-118,共10页
As Vehicular ad hoc networks (VANETs) become more sophisticated, the importance of integrating data protection and cybersecurity is increasingly evident. This paper offers a comprehensive investigation into the challe... As Vehicular ad hoc networks (VANETs) become more sophisticated, the importance of integrating data protection and cybersecurity is increasingly evident. This paper offers a comprehensive investigation into the challenges and solutions associated with the privacy implications within VANETs, rooted in an intricate landscape of cross-jurisdictional data protection regulations. Our examination underscores the unique nature of VANETs, which, unlike other ad-hoc networks, demand heightened security and privacy considerations due to their exposure to sensitive data such as vehicle identifiers, routes, and more. Through a rigorous exploration of pseudonymization schemes, with a notable emphasis on the Density-based Location Privacy (DLP) method, we elucidate the potential to mitigate and sometimes sidestep the heavy compliance burdens associated with data protection laws. Furthermore, this paper illuminates the cybersecurity vulnerabilities inherent to VANETs, proposing robust countermeasures, including secure data transmission protocols. In synthesizing our findings, we advocate for the proactive adoption of protective mechanisms to facilitate the broader acceptance of VANET technology while concurrently addressing regulatory and cybersecurity hurdles. 展开更多
关键词 Vehicular Ad-Hoc Networks (VANETs) Privacy and Data protection CYBERsecurity Pseudonymization Schemes Internet of Vehicles (IoV)
下载PDF
The future of artificial hibernation medicine:protection of nerves and organs after spinal cord injury 被引量:1
8
作者 Caiyun Liu Haixin Yu +4 位作者 Zhengchao Li Shulian Chen Xiaoyin Li Xuyi Chen Bo Chen 《Neural Regeneration Research》 SCIE CAS CSCD 2024年第1期22-28,共7页
Spinal cord injury is a serious disease of the central nervous system involving irreversible nerve injury and various organ system injuries.At present,no effective clinical treatment exists.As one of the artificial hi... Spinal cord injury is a serious disease of the central nervous system involving irreversible nerve injury and various organ system injuries.At present,no effective clinical treatment exists.As one of the artificial hibernation techniques,mild hypothermia has preliminarily confirmed its clinical effect on spinal cord injury.However,its technical defects and barriers,along with serious clinical side effects,restrict its clinical application for spinal cord injury.Artificial hibernation is a futureoriented disruptive technology for human life support.It involves endogenous hibernation inducers and hibernation-related central neuromodulation that activate particular neurons,reduce the central constant temperature setting point,disrupt the normal constant body temperature,make the body adapt"to the external cold environment,and reduce the physiological resistance to cold stimulation.Thus,studying the artificial hibernation mechanism may help develop new treatment strategies more suitable for clinical use than the cooling method of mild hypothermia technology.This review introduces artificial hibernation technologies,including mild hypothermia technology,hibernation inducers,and hibernation-related central neuromodulation technology.It summarizes the relevant research on hypothermia and hibernation for organ and nerve protection.These studies show that artificial hibernation technologies have therapeutic significance on nerve injury after spinal co rd injury through inflammatory inhibition,immunosuppression,oxidative defense,and possible central protection.It also promotes the repair and protection of res pirato ry and digestive,cardiovascular,locomoto r,urinary,and endocrine systems.This review provides new insights for the clinical treatment of nerve and multiple organ protection after spinal cord injury thanks to artificial hibernation.At present,artificial hibernation technology is not mature,and research fa ces various challenges.Neve rtheless,the effort is wo rthwhile for the future development of medicine. 展开更多
关键词 artificial hibernation central thermostatic-resista nt regulation hypothermia multi-system protection neuroprotection organ protection spinal cord injury synthetic torpor
下载PDF
Repositioning fertilizer manufacturing subsidies for improving food security and reducing greenhouse gas emissions in China 被引量:1
9
作者 Zongyi Wu Xiaolong Feng +1 位作者 Yumei Zhang Shenggen Fan 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第2期430-443,共14页
China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the ... China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the environment remains inadequately evaluated.Moreover,although green and low-carbon technologies offer environmental advantages,their widespread adoption is hindered by prohibitively high costs.This study analyzes the impact of removing fertilizer manufacturing subsidies and explores the potential feasibility of redirecting fertilizer manufacturing subsidies to invest in the diffusion of these technologies.Utilizing the China Agricultural University Agri-food Systems model,we analyzed the potential for achieving mutually beneficial outcomes regarding food security and environmental sustainability.The findings indicate that removing fertilizer manufacturing subsidies has reduced greenhouse gas(GHG)emissions from agricultural activities by 3.88 million metric tons,with minimal impact on food production.Redirecting fertilizer manufacturing subsidies to invest in green and low-carbon technologies,including slow and controlled-release fertilizer,organic-inorganic compound fertilizers,and machine deep placement of fertilizer,emerges as a strategy to concurrently curtail GHG emissions,ensure food security,and secure robust economic returns.Finally,we propose a comprehensive set of government interventions,including subsidies,field guidance,and improved extension systems,to promote the widespread adoption of these technologies. 展开更多
关键词 food security fertilizer manufacturing subsidies agri-food systems greenhouse gas emissions
下载PDF
Efficient unequal error protection for online fountain codes 被引量:1
10
作者 SHI Pengcheng WANG Zhenyong +1 位作者 LI Dezhi LYU Haibo 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期286-293,共8页
In this paper,an efficient unequal error protection(UEP)scheme for online fountain codes is proposed.In the buildup phase,the traversing-selection strategy is proposed to select the most important symbols(MIS).Then,in... In this paper,an efficient unequal error protection(UEP)scheme for online fountain codes is proposed.In the buildup phase,the traversing-selection strategy is proposed to select the most important symbols(MIS).Then,in the completion phase,the weighted-selection strategy is applied to provide low overhead.The performance of the proposed scheme is analyzed and compared with the existing UEP online fountain scheme.Simulation results show that in terms of MIS and the least important symbols(LIS),when the bit error ratio is 10-4,the proposed scheme can achieve 85%and 31.58%overhead reduction,respectively. 展开更多
关键词 online fountain code random graph unequal error protection(UEP) rateless code
下载PDF
Network pharmacology and subsequent experimental validation reveal the synergistic myocardial protection mechanism of Salvia miltiorrhiza Bge.and Carthamus tinctorius L. 被引量:1
11
作者 Linying Zhong Ling Dong +7 位作者 Jing Sun Jie Yang Zhiying Yu Ping He Bo Zhu Yuxin Zhu Siyuan Li Wenjuan Xu 《Journal of Traditional Chinese Medical Sciences》 CAS 2024年第1期44-54,共11页
Objective:To reveal the molecular mechanism underlying the compatibility of Salvia miltiorrhiza Bge(S.miltiorrhiza,Dan Shen)and C.tinctorius L.(C.tinctorius,Hong Hua)as an herb pair through network pharmacology and su... Objective:To reveal the molecular mechanism underlying the compatibility of Salvia miltiorrhiza Bge(S.miltiorrhiza,Dan Shen)and C.tinctorius L.(C.tinctorius,Hong Hua)as an herb pair through network pharmacology and subsequent experimental validation.Methods:Network pharmacology was applied to construct an active ingredient-efficacy target-disease protein network to reveal the unique regulation pattern of s.miltiorrhiza and C.tinctorius as herb pair.Molecular docking was used to verify the binding of the components of these herbs and their potential targets.An H9c2 glucose hypoxia model was used to evaluate the efficacy of the components and their synergistic effects,which were evaluated using the combination index.Western blot was performed to detect the protein expression of these targets.Results:Network pharmacology analysis revealed 5 pathways and 8 core targets of s.miltiorrhiza and C.tinctorius in myocardial protection.Five of the core targets were enriched in the hypoxia-inducible factor-1(HIF-1)signaling pathway.S.miltiorrhiza-C.tinctorius achieved vascular tone mainly by regulating the target genes of the HIF-1 pathway.As an upstream gene of the HIF-1 pathway,STAT3 can be activated by the active ingredients cryptotanshinone(Ctan),salvianolic acid B(Sal.B),and myricetin(Myric).Cell experiments revealed that Myric,Sal.B,and Ctan also exhibited synergistic myocardial protective activity.Molecular docking verified the strong binding of Myric,Sal.B,and Ctan to STAT3.Western blot further showed that the active ingredients synergistically upregulated the protein expressionof STAT3.Conclusion:The pharmacodynamic transmission analysis revealed that the active ingredients of S.miltiorrhiza and C.tinctorius can synergistically resist ischemia through various targets and pathways.This study provides a methodological reference for interpreting traditional Chinese medicine compatibility. 展开更多
关键词 S.miltiorrhiza-C.tinctorius herb pair Compatibilitymechanism Networkpharmacology Multipletargeteffect Myocardial protection
下载PDF
A Review on Security and Privacy Issues Pertaining to Cyber-Physical Systems in the Industry 5.0 Era
12
作者 Abdullah Alabdulatif Navod Neranjan Thilakarathne Zaharaddeen Karami Lawal 《Computers, Materials & Continua》 SCIE EI 2024年第9期3917-3943,共27页
The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems(CPSs)seamlessly integrate physical processes with advanced digital technologies.However,as industries become increasingly interconnect... The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems(CPSs)seamlessly integrate physical processes with advanced digital technologies.However,as industries become increasingly interconnected and reliant on smart digital technologies,the intersection of physical and cyber domains introduces novel security considerations,endangering the entire industrial ecosystem.The transition towards a more cooperative setting,including humans and machines in Industry 5.0,together with the growing intricacy and interconnection of CPSs,presents distinct and diverse security and privacy challenges.In this regard,this study provides a comprehensive review of security and privacy concerns pertaining to CPSs in the context of Industry 5.0.The review commences by providing an outline of the role of CPSs in Industry 5.0 and then proceeds to conduct a thorough review of the different security risks associated with CPSs in the context of Industry 5.0.Afterward,the study also presents the privacy implications inherent in these systems,particularly in light of the massive data collection and processing required.In addition,the paper delineates potential avenues for future research and provides countermeasures to surmount these challenges.Overall,the study underscores the imperative of adopting comprehensive security and privacy strategies within the context of Industry 5.0. 展开更多
关键词 Cyber-physical systems CPS Industry 5.0 security data privacy human-machine collaboration data protection
下载PDF
Security Implications of Edge Computing in Cloud Networks 被引量:1
13
作者 Sina Ahmadi 《Journal of Computer and Communications》 2024年第2期26-46,共21页
Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this r... Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this regard. The findings have shown that many challenges are linked to edge computing, such as privacy concerns, security breaches, high costs, low efficiency, etc. Therefore, there is a need to implement proper security measures to overcome these issues. Using emerging trends, like machine learning, encryption, artificial intelligence, real-time monitoring, etc., can help mitigate security issues. They can also develop a secure and safe future in cloud computing. It was concluded that the security implications of edge computing can easily be covered with the help of new technologies and techniques. 展开更多
关键词 Edge Computing Cloud Networks Artificial Intelligence Machine Learning Cloud security
下载PDF
Composite armor philosophy(CAP):Holistic design methodology of multi-layered composite protection systems for armored vehicles
14
作者 Evangelos Ch.Tsirogiannis Foivos Psarommatis +1 位作者 Alexandros Prospathopoulos Georgios Savaidis 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第11期181-197,共17页
A philosophy for the design of novel,lightweight,multi-layered armor,referred to as Composite Armor Philosophy(CAP),which can adapt to the passive protection of light-,medium-,and heavy-armored vehicles,is presented i... A philosophy for the design of novel,lightweight,multi-layered armor,referred to as Composite Armor Philosophy(CAP),which can adapt to the passive protection of light-,medium-,and heavy-armored vehicles,is presented in this study.CAP can serve as a guiding principle to assist designers in comprehending the distinct roles fulfilled by each component.The CAP proposal comprises four functional layers,organized in a suggested hierarchy of materials.Particularly notable is the inclusion of a ceramic-composite principle,representing an advanced and innovative solution in the field of armor design.This paper showcases real-world defense industry applications,offering case studies that demonstrate the effectiveness of this advanced approach.CAP represents a significant milestone in the history of passive protection,marking an evolutionary leap in the field.This philosophical approach provides designers with a powerful toolset with which to enhance the protection capabilities of military vehicles,making them more resilient and better equipped to meet the challenges of modern warfare. 展开更多
关键词 Passive armor protection Composite armor Ballistic performance protection systems Vehicle protection Armor design
下载PDF
An Investigation on Open-RAN Specifications:Use Cases,Security Threats,Requirements,Discussions
15
作者 Heejae Park Tri-HaiNguyen Laihyuk Park 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期13-41,共29页
The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Rece... The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Recently,the Open Radio Access Network(O-RAN)has been introduced as a solution for growing financial and operational burdens in Beyond 5G(B5G)and 6G networks.O-RAN promotes openness and intelligence to overcome the limitations of traditional RANs.By disaggregating conventional Base Band Units(BBUs)into O-RAN Distributed Units(O-DU)and O-RAN Centralized Units(O-CU),O-RAN offers greater flexibility for upgrades and network automation.However,this openness introduces new security challenges compared to traditional RANs.Many existing studies overlook these security requirements of the O-RAN networks.To gain deeper insights into the O-RAN system and security,this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G applications.We then delve into specifications of O-RAN security threats and requirements,aiming to mitigate security vulnerabilities effectively.By providing a comprehensive understanding of O-RAN architecture,use cases,and security considerations,thisworkserves as a valuable resource for future research in O-RAN and its security. 展开更多
关键词 O-RAN ARCHITECTURE use cases security issues security requirements security discussions
下载PDF
Self-actuating protection mechanisms for safer lithium-ion batteries
16
作者 Yang Luo Chunchun Sang +3 位作者 Kehan Le Hao Chen Hui Li Xinping Ai 《Journal of Energy Chemistry》 SCIE EI CAS CSCD 2024年第7期181-198,共18页
Safety issue is still a problem nowadays for the large-scale application of lithium-ion batteries(LIBs)in electric vehicles and energy storage stations.The unsafe behaviors of LIBs arise from the thermal run-away,whic... Safety issue is still a problem nowadays for the large-scale application of lithium-ion batteries(LIBs)in electric vehicles and energy storage stations.The unsafe behaviors of LIBs arise from the thermal run-away,which is intrinsically triggered by the overcharging and overheating.To improve the safety of LIBs,various protection strategies based on self-actuating reaction control mechanisms(SRCMs)have been proposed,including redox shuttle,polymerizable monomer additive,potential-sensitive separator,thermal shutdown separator,positive-temperature-coefficient electrode,thermally polymerizable addi-tive,and reversible thermal phase transition electrolyte.As build-in protection mechanisms,these meth-ods can sensitively detect either the temperature change inside battery or the potential change of the electrode,and spontaneously shut down the electrode reaction at risky conditions,thus preventing the battery from going into thermal runaway.Given their advantages in enhancing the intrinsic safety of LIBs,this paper overviews the research progresses of SRCMs after a brief introduction of thermal runaway mechanism and limitations of conventional thermal runaway mitigating measures.More importantly,the current states and issues,key challenges,and future developing trends of SRCTs are also discussed and outlined from the viewpoint of practical application,aiming at providing insights and guidance for developing more effective SRCMs for LIBs. 展开更多
关键词 Li-ion battery SAFETY Thermal runaway Thermal protection Overcharge protection
下载PDF
Survey on Video Security:Examining Threats,Challenges,and Future Trends
17
作者 Ali Asghar Amna Shifa Mamoona Naveed Asghar 《Computers, Materials & Continua》 SCIE EI 2024年第9期3591-3635,共45页
Videos represent the most prevailing form of digital media for communication,information dissemination,and monitoring.However,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing s... Videos represent the most prevailing form of digital media for communication,information dissemination,and monitoring.However,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing significant challenges.In response,various protection approaches have been developed to secure,authenticate,and ensure the integrity of digital videos.This study provides a comprehensive survey of the challenges associated with maintaining the confidentiality,integrity,and availability of video content,and examining how it can be manipulated.It then investigates current developments in the field of video security by exploring two critical research questions.First,it examine the techniques used by adversaries to compromise video data and evaluate their impact.Understanding these attack methodologies is crucial for developing effective defense mechanisms.Second,it explores the various security approaches that can be employed to protect video data,enhancing its transparency,integrity,and trustworthiness.It compares the effectiveness of these approaches across different use cases,including surveillance,video on demand(VoD),and medical videos related to disease diagnostics.Finally,it identifies potential research opportunities to enhance video data protection in response to the evolving threat landscape.Through this investigation,this study aims to contribute to the ongoing efforts in securing video data,providing insights that are vital for researchers,practitioners,and policymakers dedicated to enhancing the safety and reliability of video content in our digital world. 展开更多
关键词 ATTACKS threats security services video manipulation video security
下载PDF
Enhancing Cybersecurity Competency in the Kingdom of Saudi Arabia:A Fuzzy Decision-Making Approach
18
作者 Wajdi Alhakami 《Computers, Materials & Continua》 SCIE EI 2024年第5期3211-3237,共27页
The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual user... The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage.The widespread usage of Information Technology(IT)and IT Enable Services(ITES)reinforces securitymeasures.The constantly evolving cyber threats are a topic that is generating a lot of discussion.In this league,the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of the most significant attacks that have taken place in the region.The existing legislative framework and measures in the KSA are geared toward deterring criminal activity online.Different competency models have been devised to address the necessary cybercrime competencies in this context.The research specialists in this domain can benefit more by developing a master competency level for achieving optimum security.To address this research query,the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory(Fuzzy-DMTAEL),Fuzzy Analytic Hierarchy Process(F.AHP),and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cyber security policy.The similarities and differences between the three methods are also discussed.This cybersecurity analysis determined that the National Cyber Security Centre got the highest priority.The study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer amoreempowered ITES-driven economy for SaudiArabia.Moreover,cybersecurity specialists and policymakers need to collate their efforts to protect the country’s digital assets in the era of overt and covert cyber warfare. 展开更多
关键词 Cyber security fuzzy DMTAEL security policy cyber crime MCDM
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
19
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information security Network security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling security Architecture
下载PDF
A spotlight on dosage and subject selection for effective neuroprotection: exploring the central role of mitochondria
20
作者 John Mitrofanis Jonathan Stone +3 位作者 Michael R.Hamblin Pierre Magistretti Alim-Louis Benabid Glen Jeffery 《Neural Regeneration Research》 SCIE CAS 2025年第4期1081-1082,共2页
Neurons are notoriously vulnerable cell types.Even the slightest change in their internal and/or external environments will cause much distress and dysfunction,leading often to their death.A range of pathological cond... Neurons are notoriously vulnerable cell types.Even the slightest change in their internal and/or external environments will cause much distress and dysfunction,leading often to their death.A range of pathological conditions,including stroke,head trauma,and neurodegenerative disease,can generate stress in neurons,affecting their survival and proper function.In most neural pathologies,mitochondria become dysfunctional and this plays a pivotal role in the process of cell death.The challenge over the last few decades has been to develop effective interventions that improve neuronal homeostasis under pathological conditions.Such interventions,often referred to as disease-modifying or neuroprotective,have,however,proved frustratingly elusive,at both preclinical and,in particular,clinical levels.In this perspective,we highlight two factors that we feel are key to the development of effective neuroprotective treatments.These are:firstly,the choice of dose of intervention and method of application,and secondly,the selection of subjects,whether they be patients or the animal model. 展开更多
关键词 protective DOSAGE DISTRESS
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部