Results 21 to 30 of about 2,352,522 (144)
Implementation and Evaluation of Nodal Distribution and Movement in a 5G Mobile Network
The determining factor in the accelerated pace of informatization is the increase in the speed and reliability of data transmission networks. In this regard, new and existing standards are developed and modernized.
Dmitry Baranov +3 more
doaj +1 more source
This article discusses the possibility of generalizing the existing methods of optimization of observations to the problems of resource management of intrusion detection systems.
Nikolay V. Boldyrikhin +5 more
doaj +1 more source
Dataset of User Reactions When Filling Out Web Questionnaires
This paper presents the dataset and the results of the analysis of user reactions when filling out questionnaires. Based on the analysis of 1980 results of users’ responses to simple questionnaire questions, patterns in user reactions were revealed. Data
Shamil Magomedov +3 more
doaj +1 more source
Secure Vehicular Communication Systems: Implementation, Performance, and Research Challenges [PDF]
Vehicular Communication (VC) systems are on the verge of practical deployment. Nonetheless, their security and privacy protection is one of the problems that have been addressed only recently.
Buttyan, L. +10 more
core +4 more sources
Neural Network-Based Price Tag Data Analysis
This paper compares neural networks, specifically Unet, MobileNetV2, VGG16 and YOLOv4-tiny, for image segmentation as part of a study aimed at finding an optimal solution for price tag data analysis.
Pavel Laptev +5 more
doaj +1 more source
Mathematical Model for Choosing Counterparty When Assessing Information Security Risks
The need to assess the risks of the trustworthiness of counterparties is increasing every year. The identification of increasing cases of unfair behavior among counterparties only confirms the relevance of this topic.
Andrey Koltays +2 more
doaj +1 more source
Source attack of decoy-state quantum key distribution using phase information [PDF]
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many practical QKD systems still suffer from security ...
Chen, Teng-Yun +9 more
core +2 more sources
On Secure Workflow Decentralisation on the Internet [PDF]
Decentralised workflow management systems are a new research area, where most work to-date has focused on the system's overall architecture. As little attention has been given to the security aspects in such systems, we follow a security driven approach,
Adi Shamir +28 more
core +3 more sources
In recent years, the dependence of people on electronic syslarge amounts of data collected by honeypots. Via tems (e-systems) has increased tremendously. Examples of e-systems widely used in everyday life include stand-alone computers, wired and wireless networks, cellular telephony networks, corporateWeb sites, electronic service, e-commerce and e ...
Mohammad S. Obaidat +2 more
openaire +1 more source
Assessment of Reliability of the Transport Information Systems
In this paper is given the definition of e reliability of a transport information system, with features of transport information systems listed. Equations for calculating reliability indicators are given, as well.
Boris Zhelenkov +4 more
doaj +1 more source

