Zobrazeno 1 - 10
of 134
pro vyhledávání: '"security ontology"'
Publikováno v:
Tongxin xuebao, Vol 44, Pp 52-63 (2023)
Considering that network defense subjects were usually resource-constrained, an intelligent planning and au-tonomous implementation of network defense strategies under bounded rationality was studied considering the concept of intelligent confrontati
Externí odkaz:
https://doaj.org/article/f12669ffe7584bfda6d48d8855b9661d
Autor:
Anastasiya Kurylets, Nikolaj Goranin
Publikováno v:
Applied Sciences, Vol 13, Iss 9, p 5568 (2023)
Robotic process automation (RPA)* based on the use of software robots has proven to be one of the most demanded technologies to emerge in recent years used for automating daily IT routines in many sectors, such as banking and finance. As with any new
Externí odkaz:
https://doaj.org/article/6d17618b725e4468b88786fc83671079
Publikováno v:
Naučno-tehničeskij Vestnik Informacionnyh Tehnologij, Mehaniki i Optiki, Vol 19, Iss 1, Pp 118-126 (2019)
The paper presents research in the field of cultural heritage preservation and conservation by means of up-to-date information technologies including semantic approach and sensor networks, in particular. The subject of study is an ontology-based comp
Externí odkaz:
https://doaj.org/article/b1a74552cf974c81ae4c8a9fd14585b1
Autor:
Chang Choi, Junho Choi
Publikováno v:
IEEE Access, Vol 7, Pp 110510-110517 (2019)
For a variety of cyber-attacks occurring in a power IoT-Cloud environment, conventional security intrusion incident detection and response technologies typically use pattern- and behavior-based statistical methods. However, they cannot provide fundam
Externí odkaz:
https://doaj.org/article/c47a67155d72496898153c367b8c0527
Autor:
Yingze Liu, Yuanbo Guo
Publikováno v:
Electronics; Volume 11; Issue 24; Pages: 4128
Cyber security systems generally have the phenomena of passive defense and low-efficiency early warnings. Aiming at the above problems, this study proposes a real-time warning and plans an AI defense strategy for a cyber security system aided by a se
Autor:
Arbanas, Krunoslav, Čubrilo, Mirko
Publikováno v:
Journal of Information and Organizational Sciences. 39(2):107-136
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=603912
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Shao-Fang Wen, Basel Katt
Publikováno v:
Information, Vol 10, Iss 6, p 216 (2019)
Knowledge of software security is highly complex since it is quite context-specific and can be applied in diverse ways. To secure software development, software developers require not only knowledge about general security concepts but also about the
Externí odkaz:
https://doaj.org/article/4165854db60947f4910ea8031a73589c
Autor:
Bruno Augusti Mozzaquatro, Carlos Agostinho, Diogo Goncalves, João Martins, Ricardo Jardim-Goncalves
Publikováno v:
Sensors, Vol 18, Iss 9, p 3053 (2018)
The use of sensors and actuators as a form of controlling cyber-physical systems in resource networks has been integrated and referred to as the Internet of Things (IoT). However, the connectivity of many stand-alone IoT systems through the Internet
Externí odkaz:
https://doaj.org/article/2efde4be22aa4f5aadf569bdbe58d62f