scroll to top
0

Mobile Menu

Header Layout

EBSCO Auth Banner

Let's find your institution. Click here.

Page title

Advanced Search Results For "SECURITY systems"

1 - 10 of 176,143 results for
 "SECURITY systems"
Results per page:

Cyber Security Analysis and Evaluation for Intrusion Detection Systems.

Publication Type:Academic Journal

Source(s):Computers, Materials & Continua. 2022, Vol. 72 Issue 1, p1765-1783. 19p.

Abstract:Machine learning is a technique that is widely employed in both the academic and industrial sectors all over the world. Machine learning algorithms that are intuitive can analyse risks and respond swiftly to breaches and security issues. It is crucial ...

View details

FUZZY SYSTEM-BASED EVENT TREE ANALYSIS SUPPORT OF THE SMART SECURITY SYSTEM OF HEALTH CARE CENTERS AND HOSPITALS.

Publication Type:Academic Journal

Source(s):Interdisciplinary Description of Complex Systems. 2022, Vol. 20 Issue 3, p239-249. 11p.

Abstract:One of the keystones of the smart city is the medical area. Health care centres and hospital building structures will change in smart cities, because of the increasing trend of in-day surgery procedures, smart bracelets, and additional wearable sensors...

View details

Application of Symmetric Encryption Algorithm Sensor in the Research of College Student Security Management System.

Publication Type:Academic Journal

Source(s):Journal of Sensors. 7/7/2022, p1-7. 7p.

Abstract:In order to solve the problem of information leakage in the process of college students' information security management, this paper proposes a design of college students' security management system based on a symmetric encryption algorithm. The system...

View details

The Need for Participatory Management in the Defence and National Security System.

Publication Type:Academic Journal

Source(s):Review of International Comparative Management / Revista de Management Comparat International. Jul2022, Vol. 23 Issue 3, p400-407. 8p.

Abstract:The entire business environment and implicitly all the organizations are in an accentuated dynamic from all points of view: political, social, economic, technological, etc. The military and similar military institutions are no exception, which are obli...

View details

Towards Generating Adversarial Examples on Combined Systems of Automatic Speaker Verification and Spoofing Countermeasure.

Publication Type:Academic Journal

Source(s):Security & Communication Networks. 7/31/2022, p1-12. 12p.

Abstract:The security of unprotected automatic speaker verification (ASV) system is vulnerable to a variety of spoofing attacks where an attacker (adversary) disguises him/herself as a specific targeted user. It is a common practice to use spoofing countermeasu...

View details

Intelligence-based Network Security System to Predict the Possible Threats in Healthcare Data.

Publication Type:Academic Journal

Source(s):Security & Communication Networks. 5/26/2022, p1-12. 12p.

Abstract:The world is filled with exciting technologies and ideas; scientists build machines to avoid human intervention in completing work. It is highly challenging to complete the task without the artificial intelligence (AI) technology intervention. With tec...

View details

KlugOculus: A Vision-Based Intelligent Architecture for Security System.

Publication Type:Academic Journal

Source(s):Computational Intelligence & Neuroscience. 5/17/2022, p1-13. 13p.

Abstract:Vision-based system has gained significant attention in detecting the abnormal activities of intruders and alerting security with the amalgamation of adaptive video analytics techniques. The implementation of this kind of system works on face recogniti...

View details

The Construction Method of Computer Network Security Defense System Based on Multisource Big Data.

Publication Type:Academic Journal

Source(s):Scientific Programming. 5/12/2022, p1-13. 13p.

Abstract:This article proposes a computer network security defense system model based on multisource big data, which makes the security of computer networks more complete because of the shortage of current computer network security defense systems. The current ...

View details

Evaluation and Prediction Method of System Security Situational Awareness Index Based on HMM Model.

Publication Type:Academic Journal

Source(s):Scientific Programming. 4/12/2022, p1-11. 11p.

Abstract:In recent years, with the continuous development and progress of information technology and science and technology, big data has entered all walks of life, integrated into the lives of the public, and has become a necessity for social operation; the gr...

View details

C PROGRAMLAMA DİLİNDE KAYNAK KOD GÜVENLİĞİ: SECUREC.

Publication Type:Academic Journal

Source(s):SDU Journal of Engineering Sciences & Design. 2022, Vol. 10 Issue 2, p561-573. 13p.

Abstract:Yazılım güvenliğinin temel amacı, yazılımı kötü niyetli siber saldırılara karşı dayanıklı olacak şekilde tasarlamaktır. Yazılım güvenliği, yazılım yaşam döngüsünün her aşamasında ele alınmazsa, birçok işletme, kuruluş ve hatta hükümetler, yazılım siste...

View details

banner_970x250 (970x250)

sponsored