Search
Search Results
Found 5 items.
1 - 5 of 5 items
Abstract: Water-based automatic security marking platform composed of multifunctional underwater robots and unmanned surface vessel has become the development trend and focus for exploring complex and dangerous waters,and its related technologies have flourished and gradually developed from single control to multi-platform collaborative direction in complex and dangerous waters to reduce casualties. This paper composes and analyzes... More
Abstract:
In the last few years, cyber security has been an essential prerequisite for almost every organization to handle the massive number of emerging cyber attacks worldwide. A critical factor in reducing the possibility of being exploited is cyber security awareness. Not only having the adequate knowledge but how to utilize this knowledge to prevent cyber attacks. In this paper we conducted a... More
Abstract:
The objective of this study is to investigate a high-throughput cipher-block chaining (CBC) mode crypto circuit, which can be embedded in commercial home gateways or switches/routers. Concurrently, the area efficiency of block ciphers can be improved as well. However, the CBC mode encounters the problem of data dependency. To solve this issue, a data scheduling... More
Abstract:
This paper proposes algorithm for Increasing Virtual Machine Security Strategy in Cloud Computing computations. Imbalance between load and energy has been one of the disadvantages of old methods in providing server and hosting, so that if two virtual severs be active on a host and energy load be more on a host, it would... More
Abstract:
As cyber threats and attacks are immensely increasing and broadly spreading catastrophically worldwide, cyber security professionals need to cope up with such a highly demanding environment. Security teams, such as Security operation Centre (SOC), Incident Response (IR) and Threat management teams are the people responsible for dealing with cyber security threats and attacks from detection... More