Zobrazeno 1 - 10
of 1 142
pro vyhledávání: '"Security monitoring"'
Autor:
Javier Muñoz-Calle, Rafael Estepa Alonso, Antonio Estepa Alonso, Jesús E. Díaz-Verdejo, Elvira Castillo Fernández, Germán Madinabeitia
Publikováno v:
Journal of Universal Computer Science, Vol 30, Iss 9, Pp 1184-1204 (2024)
Network monitoring systems can struggle to detect the full sequence of actions in a multi-step cyber attack, frequently resulting in multiple alerts (some of which are false positive (FP)) and missed actions. The challenge of easing the job of securi
Externí odkaz:
https://doaj.org/article/44fbb4987ec04872b55b15a25b0ce328
Autor:
Imed El Fray, Artur Wiliński
Publikováno v:
Advances in Sciences and Technology, Vol 18, Iss 2, Pp 317-332 (2024)
In the article, a modification of Formal Model of Risk Analysis FoMRA was proposed. The Modified FoMRA (1) method takes into account the guidelines of ISO/IEC 27001 and ISO/IEC 27005 standards. The applied modification and abstraction by resources an
Externí odkaz:
https://doaj.org/article/4ea311c3cc084530bc829760f1cad7b2
Autor:
Yuzhe Li, Yuning Zhang
Publikováno v:
Sensors, Vol 24, Iss 19, p 6480 (2024)
Non-line-of-sight imaging is a technique for reconstructing scenes behind obstacles. We report a real-time passive non-line-of-sight (NLOS) imaging method for room-scale hidden scenes, which can be applied to smart home security monitoring sensing sy
Externí odkaz:
https://doaj.org/article/4e2d1f777ea845f892cece0cfb1137c7
Autor:
Mehmet Sabri Elmastaş
Publikováno v:
Havacılık ve Uzay Teknolojileri Dergisi, Vol 16, Iss 2, Pp 36-55 (2023)
Active Directory is a directory service that provides control and integrity with a centralized management and identity management to cyber structures that expand over time and increase the number of devices. Protecting user credentials, corporate sys
Externí odkaz:
https://doaj.org/article/5c43c5b485604a989979630616240401
Publikováno v:
天地一体化信息网络, Vol 4, Pp 55-61 (2023)
To enhanced the information security protection capability of communication satellites and solved the information security monitoring problem of the system under the condition of limited on-board resources, based on the comparison of some typical inf
Externí odkaz:
https://doaj.org/article/284e129c38424c9f80750db778f0da09
Publikováno v:
Applied Mathematics and Nonlinear Sciences, Vol 9, Iss 1 (2024)
In the context of the rapid development of power IoT, the application of edge computing technology has become the key to improving the level of grid intelligence and enhancing the data processing capability. This paper initially designs the edge comp
Externí odkaz:
https://doaj.org/article/f61f5ece637640f48e9286aaf0ebe908
Autor:
Chen Bin
Publikováno v:
Applied Mathematics and Nonlinear Sciences, Vol 9, Iss 1 (2024)
This paper constructs a 5G network security detection system based on the functional requirements of network security detection and the P2DR process model. The structure can be broken down into three layers from the bottom to the top: acquisition lay
Externí odkaz:
https://doaj.org/article/2eb6a3b28257454db8e4330ed6a8b6d5
Publikováno v:
Energy Reports, Vol 8, Iss , Pp 73-86 (2022)
Electricity is the foundation of the entire national economy, and nuclear power has become an important part of the power system with its unique advantages. The main process of nuclear power is the process of the nuclear fuel cycle, including the sou
Externí odkaz:
https://doaj.org/article/d866bac408434d858786bd6ae8286bd1
Publikováno v:
Energy Reports, Vol 8, Iss , Pp 1394-1411 (2022)
Traditional electricity infrastructure inspections usually have high costs, risks and it takes a long time for specialized personnel to carry them out. Additionally, they also involve scaffolding risks, that lead to a high accident rate in most elect
Externí odkaz:
https://doaj.org/article/1247ce967e3343afb6941189d9304e5b
Autor:
WANG Liuwang
Publikováno v:
Zhejiang dianli, Vol 41, Iss 10, Pp 16-26 (2022)
Video surveillance plays a vital role in ensuring the safe and stable operation of power grid. With the development of artificial intelligence, machine vision has shown great application potential in power safety monitoring. Firstly, the three ma
Externí odkaz:
https://doaj.org/article/ef82c898e4914c8296b72448554fce2a