Sign Up to like & get
recommendations!
0
Published in 2021 at "Wireless Personal Communications"
DOI: 10.1007/s11277-021-08447-7
Abstract: Because the traditional data transmission security protection methods ignore the process of multi-attribute data detection, resulting in the abnormal data false alarm rate, high missing alarm rate, eliminating accuracy and other problems, a multi-attribute data…
read more here.
Keywords:
multi attribute;
security protection;
attribute data;
data transmission ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2931365
Abstract: Currently, with the growth of the Internet of Things devices and the emergence of massive edge resources, security protection content has not only empowered IoT devices with the accumulation of networked computing and storage as…
read more here.
Keywords:
data information;
edge;
security protection;
semantics ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.2968718
Abstract: The work presented in this paper deals with a proactive network monitoring for security and protection of computing infrastructures. We provide an exploitation of an intelligent module, in the form of a as a machine…
read more here.
Keywords:
proactive network;
monitoring security;
security protection;
deep learning ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "Public Policy and Administration"
DOI: 10.13165/vpa-20-19-2-07
Abstract: The aim of this article is to analyze the process of establishing ordinance regulations in Polish municipalities and their role as a tool to protect local security. The article points to the essence of local…
read more here.
Keywords:
order;
security protection;
security;
regulations municipalities ... See more keywords