Results 31 to 40 of about 13,471 (161)

Engineering a multi-sensor surveillance system with secure alerting for next-generation threat detection and response

open access: yesResults in Engineering
This paper presents an advanced Surveillance Warning System (SWS) designed for next-generation video surveillance applications. While contemporary alert systems have improved analytics engines, their binary threat detection using only optical imaging ...
Mohammad Naim Uddin, Hussain Nyeem
doaj   +1 more source

IoT-Chain and Monitoring-Chain Using Multilevel Blockchain for IoT Security

open access: yesSensors, 2022
In general, the Internet of Things (IoT) relies on centralized servers due to limited computing power and storage capacity. These server-based architectures have vulnerabilities such as DDoS attacks, single-point errors, and data forgery, and cannot ...
Dongjun Na, Sejin Park
doaj   +1 more source

Small Island Developing States and Climate Securitisation in International Politics: Towards a Comprehensive Conception

open access: yesIsland Studies Journal, 2023
This article focuses on the engagement of Small Island Developing States (SIDS) in the climate security debate launched by the United Nations Security Council.
Athaulla A. Rasheed
doaj   +1 more source

Quantum key distribution using multilevel encoding: security analysis [PDF]

open access: yesJournal of Physics A: Mathematical and General, 2002
8 pages, 3 figures ...
Bourennane, Mohamed   +4 more
openaire   +4 more sources

Differentiated approach to evaluating the level and state of multilevel indicators on the example of economic security of the enterprise

open access: yesВісник Житомирського державного технологічного університету: Серія: економіка, управління та адміністрування, 2019
The critical review of existing methods and approaches to assessing the level and state of economic security of the enterprise as one of the well-known multi-level indicators is carried out.
Ie.V. Mishchuk
doaj   +1 more source

Security Substrate Based Security Management and Control Mecbanism of Reconfigurable Network

open access: yesDianxin kexue, 2014
The next generation internet security architectures were analyzed and the characteristics and security challenges of the existing network were studied. The security goals of reconfigurable network were defined, and the“security substrate”based security ...
Jie Chen   +4 more
doaj   +2 more sources

Multilevel Authentication for Social Network

open access: yesJOIV: International Journal on Informatics Visualization, 2018
Nowadays, social network plays a vital role in communication. Normally user used social networks in daily activities. However, this left all online users susceptible to misuse and abuse.
Dalian Wu Zhia Sheng   +2 more
doaj   +1 more source

Encrypting Audio Data Hiding by Visual Secret Sharing [PDF]

open access: yesEngineering and Technology Journal, 2009
Steganography and cryptography are usually used to ensure informationsafety in today’s data communication. This paper makes use of audiosteganography technique and encrypted secret sharing to increases the security level of hidden data.
Nidaa F. Hassan   +2 more
doaj   +1 more source

Multilevel access control for video database

open access: yesTongxin xuebao, 2012
In regards to the critical issues of classification protecting sensitive information of the data stored in video database,a multilevel access control model for the video database was proposed.A series of algorithms was designed and developed in the model
Jin-bo XIONG   +3 more
doaj   +2 more sources

MuLViS: Multi-Level Encryption Based Security System for Surveillance Videos

open access: yesIEEE Access, 2020
Video Surveillance (VS) systems are commonly deployed for real-time abnormal event detection and autonomous video analytics. Video captured by surveillance cameras in real-time often contains identifiable personal information, which must be privacy ...
Amna Shifa   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy