Articles with "security protection" as a keyword



Photo from wikipedia

Security Protection Technology in Multi-Attribute Data Transmission Based on Fuzzy Genetic Algorithm

Sign Up to like & get
recommendations!
Published in 2021 at "Wireless Personal Communications"

DOI: 10.1007/s11277-021-08447-7

Abstract: Because the traditional data transmission security protection methods ignore the process of multi-attribute data detection, resulting in the abnormal data false alarm rate, high missing alarm rate, eliminating accuracy and other problems, a multi-attribute data… read more here.

Keywords: multi attribute; security protection; attribute data; data transmission ... See more keywords
Photo by campaign_creators from unsplash

Modeling Data, Information and Knowledge for Security Protection of Hybrid IoT and Edge Resources

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2931365

Abstract: Currently, with the growth of the Internet of Things devices and the emergence of massive edge resources, security protection content has not only empowered IoT devices with the accumulation of networked computing and storage as… read more here.

Keywords: data information; edge; security protection; semantics ... See more keywords
Photo by scottwebb from unsplash

Deep Learning for Proactive Network Monitoring and Security Protection

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2968718

Abstract: The work presented in this paper deals with a proactive network monitoring for security and protection of computing infrastructures. We provide an exploitation of an intelligent module, in the form of a as a machine… read more here.

Keywords: proactive network; monitoring security; security protection; deep learning ... See more keywords
Photo from wikipedia

ESTABLISHING ORDER REGULATIONS IN MUNICIPALITIES AS AN ELEMENT OF LOCAL SECURITY PROTECTION

Sign Up to like & get
recommendations!
Published in 2020 at "Public Policy and Administration"

DOI: 10.13165/vpa-20-19-2-07

Abstract: The aim of this article is to analyze the process of establishing ordinance regulations in Polish municipalities and their role as a tool to protect local security. The article points to the essence of local… read more here.

Keywords: order; security protection; security; regulations municipalities ... See more keywords