scroll to top
Loading icon
0

Mobile Menu

Header Layout

EBSCO Auth Banner

Let's find your institution. Click here.

Page title

Advanced Search Results For "SECURITY management"

1 - 10 of 116,126 results for
 "SECURITY management"
Results per page:

Container Performance and Vulnerability Management for Container Security Using Docker Engine.

Publication Type:Academic Journal

Source(s):Security & Communication Networks. 8/10/2022, p1-11. 11p.

Abstract:Containers have evolved to support microservice architecture as a low-cost alternative to virtual machines. Containers are increasingly prevalent in the virtualization landscape because of better working; containers can bear considerably less overhead ...

View details

Application of Symmetric Encryption Algorithm Sensor in the Research of College Student Security Management System.

Publication Type:Academic Journal

Source(s):Journal of Sensors. 7/7/2022, p1-7. 7p.

Abstract:In order to solve the problem of information leakage in the process of college students' information security management, this paper proposes a design of college students' security management system based on a symmetric encryption algorithm. The system...

View details

Enterprise Information Security Management Using Internet of Things Combined with Artificial Intelligence Technology.

Publication Type:Academic Journal

Source(s):Computational Intelligence & Neuroscience. 6/14/2022, p1-16. 16p.

Abstract:This work is conducted to deal with the information security of enterprise management under the background of current global informatization, popularize the modern Internet of Things (IoT) management technology of enterprises, and maintain the informat...

View details

Information Security Risk Management Model for Big Data.

Publication Type:Academic Journal

Source(s):Advances in Multimedia. 8/8/2022, p1-10. 10p.

Abstract:In the current society of rapid expansion of information, big data have achieved vigorous development in all walks of life, considerably promoting data transmission and information sharing. Meanwhile, individuals are becoming increasingly reliant on bi...

View details

Application Research of Data Encryption Algorithm in Computer Security Management.

Publication Type:Academic Journal

Source(s):Wireless Communications & Mobile Computing. 7/14/2022, p1-7. 7p.

Abstract:In order to promote the research process of information security in the whole society, improve the safety factor of computer data communication, strengthen computer security management, the author proposes a computer data encryption strategy that combi...

View details

Analysis of Factors Affecting the Effectiveness of Military and Security Mechanisms.

Publication Type:Academic Journal

Source(s):Security & Communication Networks. 6/8/2022, p1-11. 11p.

Abstract:The paper explores the factors that will influence the effectiveness of global military and security mechanisms. This topic has been studied for many years, however, scholars' perspectives are limited to explain this topic, especially for the dynamics ...

View details

TRODIMENZIONALNI MODEL PROCESNOG UPRAVLJANJA SIGURNOŠĆU INFORMACIJA.

Publication Type:Academic Journal

Source(s):Sigurnost. 2022, Vol. 64 Issue 2, p143-149. 7p.

Abstract:U radu se daje prikaz pristupa upravljanju sigurnosti informacija utemeljenog na rizicima te multivarijatnoj analizi s više aspekata uz definirane kriterije i težište na preventivno i proaktivno upravljanje rizicima. Sigurnost informacija sustava uprav...

View details

Lightweight Security Wear Detection Method Based on YOLOv5.

Publication Type:Academic Journal

Source(s):Wireless Communications & Mobile Computing. 5/13/2022, p1-14. 14p.

Abstract:Given a large number of network parameters of the existing security wear detection, it is difficult to run on the embedded platform. Based on the idea of deep separable convolution, a lightweight security wearable target detection network based on impr...

View details

IRePf: An Instruction Reorganization Virtual Platform for Kernel Stack Overflow Detection.

Publication Type:Academic Journal

Source(s):Security & Communication Networks. 5/13/2022, p1-14. 14p.

Abstract:Stack overflow vulnerabilities are among the most common security issues. However, the existing stack overflow detection solutions only protect the return address and ignore the imbalance between function calls and returns in the system, which will lea...

View details

Cryptographic Accumulator and Its Application: A Survey.

Publication Type:Academic Journal

Source(s):Security & Communication Networks. 3/7/2022, p1-13. 13p.

Abstract:Since the concept of cryptographic accumulators was first proposed in 1993, it has received continuous attention from researchers. The application of the cryptographic accumulator is also more extensive. This paper makes a systematic summary of the cry...

View details

banner_970x250 (970x250)

sponsored