Zobrazeno 1 - 10
of 577
pro vyhledávání: '"Security protection"'
Publikováno v:
Libri, Vol 74, Iss 2, Pp 119-132 (2024)
Intelligent recommender systems provide personalized recommendation for users based on their behavior trajectories. Intelligent recommendation is a double-edged sword with increasing impacts. This study investigates the influencing mechanism of socia
Externí odkaz:
https://doaj.org/article/fc43a0fc8de44a02a1ee90b5eaaea052
Publikováno v:
Tongxin xuebao, Vol 45, Pp 60-74 (2024)
The security of industrial control protocol is the cornerstone to ensure ICS’s stable operation, a large number of industrial control protocols in the design phase ignore the consideration of security, resulting in most of the mainstream industrial
Externí odkaz:
https://doaj.org/article/71a41dd1573248248235150a5df36486
Autor:
XU Yiqiang
Publikováno v:
Dianxin kexue, Vol 40, Pp 165-175 (2024)
The dedicated network of the Jiangsu Provincial Department of Ecology and Environment is in need of upgrades and transformation. A project team was established to conduct extensive research and analysis on technical systems. After a lot of technical
Externí odkaz:
https://doaj.org/article/fff4d009aa614d9c9b6a0f121b837026
Publikováno v:
中国工程科学, Vol 25, Iss 6, Pp 126-136 (2023)
Industrial control system (ICS) is gradually transitioning from being closed and isolated to open and interconnected. The network threats to ICS are becoming highly hidden, strong-confrontation, and cross-domain in nature. Once subjected to cyberatta
Externí odkaz:
https://doaj.org/article/884d6a3b1ef24b889cb99fa26ed46314
Autor:
Małgorzata POLINCEUSZ
Publikováno v:
Humanities and Social Sciences, Vol 31, Iss 1, Pp 149-159 (2024)
This paper aims to analyze the problems resulting from the voivode’s use of a recommendation tool issued for local government administration bodies, as well as recommendations issued for local government bodies. It investigates the characteristics
Externí odkaz:
https://doaj.org/article/d8e52052bc5a4a4aada475160518a5ed
Publikováno v:
Gong-kuang zidonghua, Vol 50, Iss 3, Pp 14-21 (2024)
With the continuous construction and promotion of intelligent mining information infrastructure, the switching of mine terminal equipment between private and public networks has introduced information security risks to the mine network. It is necessa
Externí odkaz:
https://doaj.org/article/ba9bb64a80ac4c39ad55e19f6a02e2d1
Publikováno v:
Measurement: Sensors, Vol 33, Iss , Pp 101221- (2024)
In order to solve the problem of poor network security protection performance of traditional network information security protection systems, the author proposes a network information security system control modeling based on deep learning data inter
Externí odkaz:
https://doaj.org/article/e91c9a6067f54bd980f459d388c93358
Publikováno v:
Cryptography, Vol 8, Iss 3, p 34 (2024)
With the boom in artificial intelligence (AI), numerous reconfigurable convolution neural network (CNN) accelerators have emerged within both industry and academia, aiming to enhance AI computing capabilities. However, this rapid landscape has also w
Externí odkaz:
https://doaj.org/article/455949cb248a41c2acd8d56d63b78397
Autor:
Na Rongcui
Publikováno v:
Applied Mathematics and Nonlinear Sciences, Vol 9, Iss 1 (2024)
With the continuous development and integration of information technology and industrialization-related technologies, industrial Internet control system security attacks occur frequently, and it is more and more important to build an information secu
Externí odkaz:
https://doaj.org/article/8b3bae5256524381b3a68131c442acfc
Autor:
Jiang Fan
Publikováno v:
Applied Mathematics and Nonlinear Sciences, Vol 9, Iss 1 (2024)
This paper examines the relevant legal system and integrates blockchain technology to ensure network information security protection at multiple levels, thereby meeting the requirements for network information security protection. The network informa
Externí odkaz:
https://doaj.org/article/a8ab3e82be2f42bdbf85e94c28eeb007