scroll to top
Press enter or spacebar to select a desired language.
Press enter or spacebar to select a desired language.
Your source for trusted research content

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "SECURITY systems"

1 - 10 of 185,351 results for
 "SECURITY systems"
Press enter or spacebar to adjust the number of results displayed.

Tamper Detection in Industrial Sensors: An Approach Based on Anomaly Detection.

Publication Type: Academic Journal

Source(s): Sensors (14248220). Nov2023, Vol. 23 Issue 21, p8908. 17p.

Abstract: The Industrial Revolution 4.0 has catapulted the integration of advanced technologies in industrial operations, where interconnected systems rely heavily on sensor information. However, this dependency has revealed an essential vulnerability: Sabotagin...

Strengthening Cloud Security: An Innovative Multi-Factor Multi-Layer Authentication Framework for Cloud User Authentication.

Publication Type: Academic Journal

Source(s): Applied Sciences (2076-3417). Oct2023, Vol. 13 Issue 19, p10871. 24p.

Abstract: Cloud multi-factor authentication is a critical security measure that helps strengthen cloud security from unauthorized access and data breaches. Multi-factor authentication verifies that authentic cloud users are only authorized to access cloud apps, ...

Towards an Intelligent Intrusion Detection System to Detect Malicious Activities in Cloud Computing.

Publication Type: Academic Journal

Source(s): Applied Sciences (2076-3417). Sep2023, Vol. 13 Issue 17, p9588. 19p.

Abstract: Several sectors have embraced Cloud Computing (CC) due to its inherent characteristics, such as scalability and flexibility. However, despite these advantages, security concerns remain a significant challenge for cloud providers. CC introduces new vuln...

Security Quantification for Discrete Event Systems Based on the Worth of States.

Publication Type: Academic Journal

Source(s): Mathematics (2227-7390). Sep2023, Vol. 11 Issue 17, p3629. 17p.

Abstract: This work addresses the problem of quantifying opacity for discrete event systems. We consider a passive intruder who knows the overall structure of a system but has limited observational capabilities and tries to infer the secret of this system based ...

Acceptability of an Improvised Motorcycle Anti-Theft Security System with SMS and Call Notification.

Publication Type: Academic Journal

Source(s): Psychology & Education: A Multidisciplinary Journal. 9/3/2023, Vol. 13 Issue 3, p290-297. 8p.

Abstract: This study focused on the development and evaluation of an Improvised Motorcycle Anti-Theft Security System with SMS and Call Notification to help owners protect their motorcycles and reduce the theft related incidents in the Philippines. The researche...

Social Media Zero-Day Attack Detection Using TensorFlow.

Publication Type: Academic Journal

Source(s): Electronics (2079-9292). Sep2023, Vol. 12 Issue 17, p3554. 20p.

Abstract: In the current information era, knowledge can pose risks in the online realm. It is imperative to proactively recognize potential threats, as unforeseen dangers cannot be eliminated entirely. Often, malware exploits and other emerging hazards are only ...

Designing an Adaptive Age-Invariant Face Recognition System for Enhanced Security in Smart Urban Environments.

Publication Type: Academic Journal

Source(s): Ingénierie des Systèmes d'Information. Aug2023, Vol. 28 Issue 4, p815-822. 8p.

Abstract: The advent of smart technology in urban environments has often been hailed as the solution to a plethora of contemporary urban challenges, ranging from environmental conservation to waste management and transportation. However, the critical aspect of s...

Security- and Reliability-Guaranteed Transmission Control of Time-Sensitive Physical Layer Security Systems.

Publication Type: Academic Journal

Source(s): Entropy. Jul2023, Vol. 25 Issue 7, p1040. 18p.

Abstract: In this paper, we consider information transmission over a three-node physical layer security system. Based on the imperfect estimations of the main channel and the eavesdropping channel, we propose reducing the outage probability and interception prob...

Research on the Construction of China's Provincial Food Security Evaluation System and Regional Performance—Based on the "Great Food View".

Publication Type: Academic Journal

Source(s): Agriculture; Basel. Jun2023, Vol. 13 Issue 6, p1240. 20p.

Abstract: Based on the internationally recognized concept of food security and the scientific connotation of the "Great Food View". This research constructs China's provincial food security evaluation system under the "Great Food View" by comprehensively conside...

Innovative Techniques for Safety, Reliability, and Security in Control Systems.

Publication Type: Academic Journal

Source(s): Processes. Jun2023, Vol. 11 Issue 6, p1795. 4p.

Abstract: Control systems have become a critical component in the advancement of many engineering and science fields. It gives an introduction to the research significance, control theory, and methods used in these systems and classifies the synchronization cont...

sponsored