-
1
Risks to Energy Security. Visualization of Scientific Research
Published 2024-06-01“…The results of the study made it possible to identify the main scientific clusters in the field of energy security risks. Visualization of the network map of keywords made it possible to identify 8 clusters that characterize the key areas of research in the field of energy security risks: security, risk, energy, human health, climate change, renewable energy, environment. …”
Get full text
Article -
2
Survey on the visualization technologies of threatening security data in cyber space
Published 2018-02-01Subjects: “…cyber space security…”
Get full text
Article -
3
Integrating Visual Cryptography for Efficient and Secure Image Sharing on Social Networks
Published 2025-04-01Subjects: “…image security…”
Get full text
Article -
4
Study and implementation of integrated network security monitoring system
Published 2003-01-01“…In this paper, a novel model of integrated network security monitoring system (NSMS) is proposed, not only NSMS can capture different kinds of intrusion events from multiple and distributed heterogeneous Sensors, but also it can correlate these relative proofs, finally it can visualize the reasoning process. …”
Get full text
Article -
5
METHOD OF CONTENT-DEPENDENT WATERMARKING IMAGES BASED ON SECURITY VISUAL SECRET SHARING SCHEME
Published 2019-06-01Get full text
Article -
6
Securing air defense visual information with hyperchaotic Folded Towel Map-Based encryption
Published 2024-11-01Get full text
Article -
7
3D visualization design of digital intelligent landscape environment based on wireless network security
Published 2025-05-01Get full text
Article -
8
Design of a home video behavior recognition system based on visual privacy security mechanism
Published 2025-04-01Subjects: “…visual privacy security…”
Get full text
Article -
9
A Secure Approach Out-of-Band for e-Bank with Visual Two-Factor Authorization Protocol
Published 2024-11-01“…The article presents an innovative approach for secure authentication in internet banking transactions, utilizing an Out-of-Band visual two-factor authorization protocol. …”
Get full text
Article -
10
Why to Fail Fast and Often: A Strategy for OT Safety and Security Evaluation
Published 2025-01-01Subjects: “…OT safety and security…”
Get full text
Article -
11
25th ICPR—Real‐time Visual Surveillance as‐a‐Service (VSaaS) for smart security solutions
Published 2022-07-01Get full text
Article -
12
Visual explanation method for reversible neural networks
Published 2023-12-01Subjects: Get full text
Article -
13
Visually Secure Deep Joint Source-Channel Coding With Chaotic Map Against Deep Known-Plaintext Attack
Published 2025-01-01Subjects: Get full text
Article -
14
FEATURES OF THE MODEL OF A SPECIALIZED GEOSPATIAL DATABASE FOR VISUALIZING INDICATORS OF HUMAN SOCIO-ECONOMIC SECURITY IN WARTIME CONDITIONS
Published 2025-01-01Subjects: “…social-economic security…”
Get full text
Article -
15
System for collecting, analyzing and visualizing data about devices in the Internet
Published 2019-06-01“…This article describes the system for collecting, analyzing and visualizing of technical information about devices connected to the Internet based on the Censys platform. …”
Get full text
Article -
16
Wormhole Whispers: Reflecting User Privacy Data Boundaries Through Algorithm Visualization
Published 2025-02-01Subjects: Get full text
Article -
17
Enhancing Data Privacy Protection and Feature Extraction in Secure Computing Using a Hash Tree and Skip Attention Mechanism
Published 2024-11-01“…This research contributes a new framework for secure computing, addressing both the security and efficiency concerns prevalent in current methodologies.…”
Get full text
Article -
18
Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication
Published 2022-11-01“…Image encryption is an effective method to protect private images by converting them into meaningless ones, but many current image encryption algorithms still have security and efficiency problems. This paper combines compressed sensing (CS) and secret image sharing (SIS) to propose a certifiable visually secure image selection encryption. …”
Get full text
Article -
19
Smallholders and small-scale agriculture: Mapping and visualization of knowledge domains and research trends
Published 2023-12-01Subjects: Get full text
Article -
20
CNN-Based Object Recognition and Tracking System to Assist Visually Impaired People
Published 2022-01-01Subjects: Get full text
Article