Results 31 to 40 of about 13,471 (161)
This paper presents an advanced Surveillance Warning System (SWS) designed for next-generation video surveillance applications. While contemporary alert systems have improved analytics engines, their binary threat detection using only optical imaging ...
Mohammad Naim Uddin, Hussain Nyeem
doaj +1 more source
IoT-Chain and Monitoring-Chain Using Multilevel Blockchain for IoT Security
In general, the Internet of Things (IoT) relies on centralized servers due to limited computing power and storage capacity. These server-based architectures have vulnerabilities such as DDoS attacks, single-point errors, and data forgery, and cannot ...
Dongjun Na, Sejin Park
doaj +1 more source
This article focuses on the engagement of Small Island Developing States (SIDS) in the climate security debate launched by the United Nations Security Council.
Athaulla A. Rasheed
doaj +1 more source
Quantum key distribution using multilevel encoding: security analysis [PDF]
8 pages, 3 figures ...
Bourennane, Mohamed +4 more
openaire +4 more sources
The critical review of existing methods and approaches to assessing the level and state of economic security of the enterprise as one of the well-known multi-level indicators is carried out.
Ie.V. Mishchuk
doaj +1 more source
Security Substrate Based Security Management and Control Mecbanism of Reconfigurable Network
The next generation internet security architectures were analyzed and the characteristics and security challenges of the existing network were studied. The security goals of reconfigurable network were defined, and the“security substrate”based security ...
Jie Chen +4 more
doaj +2 more sources
Multilevel Authentication for Social Network
Nowadays, social network plays a vital role in communication. Normally user used social networks in daily activities. However, this left all online users susceptible to misuse and abuse.
Dalian Wu Zhia Sheng +2 more
doaj +1 more source
Encrypting Audio Data Hiding by Visual Secret Sharing [PDF]
Steganography and cryptography are usually used to ensure informationsafety in today’s data communication. This paper makes use of audiosteganography technique and encrypted secret sharing to increases the security level of hidden data.
Nidaa F. Hassan +2 more
doaj +1 more source
Multilevel access control for video database
In regards to the critical issues of classification protecting sensitive information of the data stored in video database,a multilevel access control model for the video database was proposed.A series of algorithms was designed and developed in the model
Jin-bo XIONG +3 more
doaj +2 more sources
MuLViS: Multi-Level Encryption Based Security System for Surveillance Videos
Video Surveillance (VS) systems are commonly deployed for real-time abnormal event detection and autonomous video analytics. Video captured by surveillance cameras in real-time often contains identifiable personal information, which must be privacy ...
Amna Shifa +7 more
doaj +1 more source

