Zobrazeno 1 - 10
of 181
pro vyhledávání: '"network information security"'
Autor:
Bing TIAN
Publikováno v:
Chengshi guidao jiaotong yanjiu, Vol 27, Iss 4, Pp 51-55 (2024)
Objective Critical information systems in URT (urban rail transit) usually use classical cryptographic algorithms for data encryption. The development of quantum information science poses a significant threat to the security of classical cryptography
Externí odkaz:
https://doaj.org/article/9e3da29350514598a5ea7787e1ed7897
Publikováno v:
Mathematics, Vol 12, Iss 19, p 3114 (2024)
To facilitate a direct comparison of the differences in network resources among countries worldwide, this paper proposes a method for quantifying the relationship between autonomous systems and territorial networks from the perspective of network top
Externí odkaz:
https://doaj.org/article/de31d573c76f441e849d4c5984084e61
Autor:
Matteo Buffa
Publikováno v:
Democrazia e Diritti Sociali, Vol 2023, Iss 1, Pp 47-64 (2023)
This contribution looks at the recent approval of NIS II directive as a relevant reform for cybersecurity in Europe, which will be confronted with the intersections between innovation, new training needs and the challenges of the so-called living Law
Externí odkaz:
https://doaj.org/article/a8bfd376214d4dd99fa376a6743d7df3
Autor:
Jiang Fan
Publikováno v:
Applied Mathematics and Nonlinear Sciences, Vol 9, Iss 1 (2024)
This paper examines the relevant legal system and integrates blockchain technology to ensure network information security protection at multiple levels, thereby meeting the requirements for network information security protection. The network informa
Externí odkaz:
https://doaj.org/article/a8ab3e82be2f42bdbf85e94c28eeb007
Autor:
Matteo Buffa
Publikováno v:
Open Journal of Humanities, Vol 13, Pp 163-225 (2023)
European Union Law proposes important and profound revision of the Directive on network and information security considering the need for a new, and better, standardization of Member States’ national law about cybersecurity. Such reform appears to
Externí odkaz:
https://doaj.org/article/3499cfa601ab40378f18b59fbb1f2b74
Publikováno v:
Безопасность информационных технологий, Vol 30, Iss 1, Pp 81-91 (2023)
Information security tools are an integral part of system users. The concept of information security implies the development and expansion of the scope of innovative technologies in information processing. To keep the information security system up t
Externí odkaz:
https://doaj.org/article/25d4111110d54aa69b84e34d341b3525
Publikováno v:
Energy Reports, Vol 8, Iss , Pp 12643-12652 (2022)
With the progress of society, the use of intelligent flowmeters has become more and more widespread. The powerful functions of intelligent flowmeters have made people’s production and living more convenient. Still, at the same time, public data, in
Externí odkaz:
https://doaj.org/article/597be884b36048fbb24e6e0be140457b
Publikováno v:
Kongzhi Yu Xinxi Jishu, Iss 1, Pp 97-102 (2022)
With the advent of the information age, openness and internet nature of network are increasing enhanced. At present, in railway industry, vehicle-ground communication network and related railway information systems based on wireless communication and
Externí odkaz:
https://doaj.org/article/42e73b5be88a486c854947d9280dcdfb
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Dianxin kexue, Vol 36, Pp 34-41 (2020)
Nowadays,electric power enterprises have realized the operation and production of information technology,and the importance of network information security evaluation is more and more obvious.Two-level fuzzy comprehensive evaluation method was used t
Externí odkaz:
https://doaj.org/article/cf06065bf68c40d294ebe46b9dbf7d36