亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

Security

網絡安全技術及其協議,包括了網絡通信安全、信息在網絡傳輸中的保密性和完整性、控制訪問受限網域與敏感信息以及在公共網絡如因特網上使用隱秘通訊。為了解決這些問題,各大組織及技術供應商紛紛推出了各種網絡和信息安全技術。
  • The Universal Radio Hacker (URH)

    The Universal Radio Hacker (URH) is a software for investigating unknown wireless protocols. Features include * __hardware interfaces__ for common Software Defined Radios * __easy demodulation__ of signals * __assigning participants__ to keep overview of your data * __customizable decodings__ to crack even sophisticated encodings like CC1101 data whitening * __assign labels__ to reveal the logic of the protocol * __fuzzing component__ to find Security leaks * __modulation support__ to inject the data back into the system * __simulation environment__ to perform stateful attacks

    標簽: Universal Hacker Radio The URH

    上傳時間: 2018-11-23

    上傳用戶:milo

  • Cyber-Physical Systems

    This book provides an overview of recent innovations and achievements in the broad areas of cyber-physical systems (CPS), including architecture, networking, systems, applications, Security, and privacy. The book discusses various new CPS technologies from diverse aspects to enable higher level of innovation towards intelligent life. The book provides insight to the future integration, coordination and interaction between the physical world, the information world, and human beings. The book features contributions from renowned researchers and engineers, who discuss key issues from various perspectives, presenting opinions and recent CPS-related achievements.Investigates how to advance the development of cyber-physical systems Provides a joint consideration of other newly emerged technologies and concepts in relation to CPS like cloud computing, big data, fog computing, and crowd sourcing Includes topics related to CPS such as architecture, system, networking, application, algorithm, Security and privacy

    標簽: Cyber-Physical Systems

    上傳時間: 2019-04-21

    上傳用戶:danyun

  • GSM 03.48

    Digital cellular telecommunications system (Phase 2+); Security mechanisms for SIM application toolkit; Stage 2 (3GPP TS 03.48 version 8.8.0 Release 1999)

    標簽: GSM

    上傳時間: 2019-06-14

    上傳用戶:twogozi

  • Fundamental Limits on a Class of Secure

    Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the Security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.

    標簽: Fundamental Limits Secure Class on of

    上傳時間: 2020-01-04

    上傳用戶:kddlas

  • Active+and+Programmable+Networks

    New applications such as video conferencing, video on demand, multi- media transcoders, Voice-over-IP (VoIP), intrusion detection, distributed collaboration, and intranet Security require advanced functionality from networks beyond simple forwarding congestion control techniques. 

    標簽: Programmable Networks Active and

    上傳時間: 2020-05-26

    上傳用戶:shancjb

  • Short-range+Wireless+Communication

    Developers, manufacturers and marketers of products incorporating short- range radio systems are experts in their fields—Security, telemetry, medical care, to name a few. Often they add a wireless interface just to eliminate wires on an existing wired product. They may adapt a wireless subsystem, which is easy to integrate electrically into their system, only to find that the range is far short of what they expected, there are frequent false alarms, or it doesn’t work at all. It is for these adapters of wireless subsystems that this book is primarily intended.

    標簽: Communication Short-range Wireless

    上傳時間: 2020-06-01

    上傳用戶:shancjb

  • Telecommunications Essentials Global Source

    In this updated and expanded edition of her excellent telecommunications primer, Lili explains in just the right detail everything you need to know to become fluent in this most important and fascinating industry. Besides including a satisfying amount of expert technical detail, the book also discusses equally crucial aspects of how communications technology affects society, culture, and politics. Electronic communications is changing the world for the better; learn from Lili's expertise how you, too, can participate in the revolution." Steve Riley, senior Security strategist, Microsoft Corporation

    標簽: Telecommunications Essentials Global Source

    上傳時間: 2020-06-01

    上傳用戶:shancjb

  • Service+Robotics+within+the+Digital+Home

    Over the past few decades there has been an exponential growth in service robots and smart home technologies, which has led to the development of exciting new products in our daily lives. Service robots can be used to provide domestic aid for the elderly and disabled, serving various functions ranging from cleaning to enter- tainment. Service robots are divided by functions, such as personal robots, field robots, Security robots, healthcare robots, medical robots, rehabilitation robots and entertainment robots. A smart home appears “intelligent” because its embedded computers can monitor so many aspects of the daily lives of householders. For example, the refrigerator may be able to monitor its contents, suggest healthy alter- natives and order groceries. Also, the smart home system may be able to clean the house and water the plants.

    標簽: Robotics Service Digital within Home the

    上傳時間: 2020-06-06

    上傳用戶:shancjb

  • Big+Data+Analytics+Strategies

    This is a practical book, to be sure, but it is also a book about hope and posi- tive change. I am quite sincere. The delivery of electricity is deeply rooted in the principle of universal access; when clean, reliable energy is available it contributes to poverty alleviation, improved social conditions, and enhanced economic development. In the developed world, we know this to be true. The digital fabric of our lives is a testimony to the importance of energy Security. Across the globe, we have seen the vital contributions that electrification has brought to the development of economies and an enhanced quality of life. Nonetheless, this supreme engineering achievement has languished, and we are deeply challenged.

    標簽: Strategies Analytics Data Big

    上傳時間: 2020-06-07

    上傳用戶:shancjb

  • Computational+Intelligence

    The large-scale deployment of the smart grid (SG) paradigm could play a strategic role in supporting the evolution of conventional electrical grids toward active, flexible and self- healing web energy networks composed of distributed and cooperative energy resources. From a conceptual point of view, the SG is the convergence of information and operational technologies applied to the electric grid, providing sustainable options to customers and improved Security. Advances in research on SGs could increase the efficiency of modern electrical power systems by: (i) supporting the massive penetration of small-scale distributed and dispersed generators; (ii) facilitating the integration of pervasive synchronized metering systems; (iii) improving the interaction and cooperation between the network components; and (iv) allowing the wider deployment of self-healing and proactive control/protection paradigms.

    標簽: Computational Intelligence

    上傳時間: 2020-06-07

    上傳用戶:shancjb

主站蜘蛛池模板: 临桂县| 金华市| 淮阳县| 梅河口市| 土默特左旗| 时尚| 昌黎县| 买车| 永康市| 武宁县| 甘孜县| 贺州市| 舟曲县| 内江市| 郁南县| 天长市| 施秉县| 什邡市| 卓资县| 财经| 台东县| 佛冈县| 南投县| 巴东县| 利津县| 同心县| 南昌市| 枝江市| 且末县| 综艺| 龙川县| 龙里县| 汉寿县| 玛曲县| 淮阳县| 祁东县| 临邑县| 旬阳县| 遂溪县| 张家口市| 海盐县|