Showing 1 - 20 results of 841 for search 'security in visualization', query time: 0.12s Refine Results
  1. 1

    Risks to Energy Security. Visualization of Scientific Research by Hubarieva Iryna O., Khaustov Mykyta M.

    Published 2024-06-01
    “…The results of the study made it possible to identify the main scientific clusters in the field of energy security risks. Visualization of the network map of keywords made it possible to identify 8 clusters that characterize the key areas of research in the field of energy security risks: security, risk, energy, human health, climate change, renewable energy, environment. …”
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Study and implementation of integrated network security monitoring system by ZHANG Hui-min, QIAN Yi-ping, ZHENG Qing-hua, DONG Shi-jie, GUAN Xiao-hong

    Published 2003-01-01
    “…In this paper, a novel model of integrated network security monitoring system (NSMS) is proposed, not only NSMS can capture different kinds of intrusion events from multiple and distributed heterogeneous Sensors, but also it can correlate these relative proofs, finally it can visualize the reasoning process. …”
    Get full text
    Article
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    A Secure Approach Out-of-Band for e-Bank with Visual Two-Factor Authorization Protocol by Laerte Peotta de Melo, Dino Macedo Amaral, Robson de Oliveira Albuquerque, Rafael Timóteo de Sousa Júnior, Ana Lucila Sandoval Orozco, Luis Javier García Villalba

    Published 2024-11-01
    “…The article presents an innovative approach for secure authentication in internet banking transactions, utilizing an Out-of-Band visual two-factor authorization protocol. …”
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    System for collecting, analyzing and visualizing data about devices in the Internet by Sh. R. Davlatov, P. V. Kuchynski

    Published 2019-06-01
    “…This article describes the system for collecting, analyzing and visualizing of technical information about devices connected to the Internet based on the Censys platform. …”
    Get full text
    Article
  16. 16
  17. 17

    Enhancing Data Privacy Protection and Feature Extraction in Secure Computing Using a Hash Tree and Skip Attention Mechanism by Zizhe Zhou, Yaqi Wang, Lin Cong, Yujing Song, Tianyue Li, Meishu Li, Keyi Xu, Chunli Lv

    Published 2024-11-01
    “…This research contributes a new framework for secure computing, addressing both the security and efficiency concerns prevalent in current methodologies.…”
    Get full text
    Article
  18. 18

    Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication by Zhihua Gan, Shiping Song, Lin Zhou, Daojun Han, Jiangyu Fu, Xiuli Chai

    Published 2022-11-01
    “…Image encryption is an effective method to protect private images by converting them into meaningless ones, but many current image encryption algorithms still have security and efficiency problems. This paper combines compressed sensing (CS) and secret image sharing (SIS) to propose a certifiable visually secure image selection encryption. …”
    Get full text
    Article
  19. 19
  20. 20