Results 21 to 30 of about 2,352,522 (144)

Implementation and Evaluation of Nodal Distribution and Movement in a 5G Mobile Network

open access: yesFuture Internet, 2021
The determining factor in the accelerated pace of informatization is the increase in the speed and reliability of data transmission networks. In this regard, new and existing standards are developed and modernized.
Dmitry Baranov   +3 more
doaj   +1 more source

Features of the Practical Implementation of the Method for Managing Observations of the State of Monitored Objects in Intrusion Detection Systems

open access: yesApplied Sciences, 2023
This article discusses the possibility of generalizing the existing methods of optimization of observations to the problems of resource management of intrusion detection systems.
Nikolay V. Boldyrikhin   +5 more
doaj   +1 more source

Dataset of User Reactions When Filling Out Web Questionnaires

open access: yesData, 2020
This paper presents the dataset and the results of the analysis of user reactions when filling out questionnaires. Based on the analysis of 1980 results of users’ responses to simple questionnaire questions, patterns in user reactions were revealed. Data
Shamil Magomedov   +3 more
doaj   +1 more source

Secure Vehicular Communication Systems: Implementation, Performance, and Research Challenges [PDF]

open access: yes, 2008
Vehicular Communication (VC) systems are on the verge of practical deployment. Nonetheless, their security and privacy protection is one of the problems that have been addressed only recently.
Buttyan, L.   +10 more
core   +4 more sources

Neural Network-Based Price Tag Data Analysis

open access: yesFuture Internet, 2022
This paper compares neural networks, specifically Unet, MobileNetV2, VGG16 and YOLOv4-tiny, for image segmentation as part of a study aimed at finding an optimal solution for price tag data analysis.
Pavel Laptev   +5 more
doaj   +1 more source

Mathematical Model for Choosing Counterparty When Assessing Information Security Risks

open access: yesRisks, 2021
The need to assess the risks of the trustworthiness of counterparties is increasing every year. The identification of increasing cases of unfair behavior among counterparties only confirms the relevance of this topic.
Andrey Koltays   +2 more
doaj   +1 more source

Source attack of decoy-state quantum key distribution using phase information [PDF]

open access: yes, 2013
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many practical QKD systems still suffer from security ...
Chen, Teng-Yun   +9 more
core   +2 more sources

On Secure Workflow Decentralisation on the Internet [PDF]

open access: yes, 2010
Decentralised workflow management systems are a new research area, where most work to-date has focused on the system's overall architecture. As little attention has been given to the security aspects in such systems, we follow a security driven approach,
Adi Shamir   +28 more
core   +3 more sources

Security of e‐systems [PDF]

open access: yesSecurity and Communication Networks, 2013
In recent years, the dependence of people on electronic syslarge amounts of data collected by honeypots. Via tems (e-systems) has increased tremendously. Examples of e-systems widely used in everyday life include stand-alone computers, wired and wireless networks, cellular telephony networks, corporateWeb sites, electronic service, e-commerce and e ...
Mohammad S. Obaidat   +2 more
openaire   +1 more source

Assessment of Reliability of the Transport Information Systems

open access: yesCommunications, 2022
In this paper is given the definition of e reliability of a transport information system, with features of transport information systems listed. Equations for calculating reliability indicators are given, as well.
Boris Zhelenkov   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy