The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a high level hardware architecture for safe cyber-physical systems taking into account security concerns. The in the safety domain well known one-out-of-two (1oo2) architecture is extended to allow the implementation of security measures which are designed in a way to be independent from the safety functionality of the system so that the security parts do not have to undergo the...
The paper proposes the framework, modules, design and implementation of thesis management system based on specific thesis management mode. The system uses ASP.NET as front development tool, SQL Server 2005 as the background database tool, and based on B/S structure. The system includes these features, teachers submitting topics online, students selecting topics online, exchanges of teachers and students...
The school network as the important infrastructure plays many roles such as school teaching, research, management and foreign exchange, and so on. School network directly affects the security situation in the school's teaching activities. In the early stages of the network, security may not be prominent. With the deeply application, various data online in the school network will increase sharply,...
Compared with traditional guard management, this system uses radio frequency identification technology (RFID) to achieve intelligent access management. When need identification, RFID reader issues a fixed frequency radio. Then label card is stimulated, and returns ID number. By ID number and database information, we have developed a lot of access control management functions, such as staff automatic...
Intrusion detection technology has developed over more than 30 years from the host-based to network-based and has become the indispensable security technology of information systems. On the basis of the study of the existing intrusion detection systems, this paper reviews the history of intrusion detection technology, and sum up the recent hot-spot problems researched. Then, six technical difficulties...
To obtain, understand and evaluate numerous factors of affecting network security with network security situation perception, it can predict the future development tendency, it is a kind of means of analyzing the network security quantitatively, and it is also a fine measurement of network security, studying the situation perception technology has the important meaning. This paper combining visualization...
The nature of white space utilization, tremendous data processing, heterogeneous coexistence and security guarantees in Wireless Cognitive Sensor Network (WCSN) brings significant advantages over traditional Wireless Sensor Network (WSN). However, due to the introduction of spectrum sensing, dynamic spectrum access technology, WCSN is challenged by a variety of security threats in addition to that...
To deal with the challenges of Wireless Sensor Networks (WSN) in the smart grid, such as heterogeneous coexistence, spectrum scarcity, tremendous data processing and Security guarantees, revolutionary communication architecture is urgently demanded, a revolutionary communication paradigm termed as Wireless Cognitive Sensor Network (WCSN) whose basic idea is to incorporate cognitive radio capability...
This Security of mobile phones had been more important with the widespread use of mobile. A new algorithm was proposed in this paper which encrypted based on user's behavior on the screen of mobile phone, it could assure the safety of mobile platform information. With the android exploited by Google, behavior encryption application system had been designed and realized focusing on the mobile platform...
The most fundamental means of maintaining mechanical safety is to systematically carry out safety design and analysis in the mechanical design process. The fuzzy comprehensive evaluation method is to take the advantages of the level analytic hierarchy process and fuzzy comprehensive evaluation method. Firstly, the evaluation index system is divided into ladder level structure, calculated the index...
The rapid increasing of variety and quantity of business brings about serious challenge to the server resources of datacenters. It is difficult for the traditional solution of server running and management to tackle with the changing need of services. The physical server sprawl leads to shortage of computer rack and room space. Meanwhile, the energy consuming increases, so do the difficulty of the...
The network security situation perception technology as active defense technology has become the new research direction of network security field. On the basis of analyzing and summarizing the basic concept and the model of network security situation perception, put forward a method of network security situation perception based on artificial life. This method builds an artificial life model which...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.