亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

security

網(wǎng)絡(luò)安全技術(shù)及其協(xié)議,包括了網(wǎng)絡(luò)通信安全、信息在網(wǎng)絡(luò)傳輸中的保密性和完整性、控制訪問受限網(wǎng)域與敏感信息以及在公共網(wǎng)絡(luò)如因特網(wǎng)上使用隱秘通訊。為了解決這些問題,各大組織及技術(shù)供應(yīng)商紛紛推出了各種網(wǎng)絡(luò)和信息安全技術(shù)。
  • The Universal Radio Hacker (URH)

    The Universal Radio Hacker (URH) is a software for investigating unknown wireless protocols. Features include * __hardware interfaces__ for common Software Defined Radios * __easy demodulation__ of signals * __assigning participants__ to keep overview of your data * __customizable decodings__ to crack even sophisticated encodings like CC1101 data whitening * __assign labels__ to reveal the logic of the protocol * __fuzzing component__ to find security leaks * __modulation support__ to inject the data back into the system * __simulation environment__ to perform stateful attacks

    標(biāo)簽: Universal Hacker Radio The URH

    上傳時間: 2018-11-23

    上傳用戶:milo

  • Cyber-Physical Systems

    This book provides an overview of recent innovations and achievements in the broad areas of cyber-physical systems (CPS), including architecture, networking, systems, applications, security, and privacy. The book discusses various new CPS technologies from diverse aspects to enable higher level of innovation towards intelligent life. The book provides insight to the future integration, coordination and interaction between the physical world, the information world, and human beings. The book features contributions from renowned researchers and engineers, who discuss key issues from various perspectives, presenting opinions and recent CPS-related achievements.Investigates how to advance the development of cyber-physical systems Provides a joint consideration of other newly emerged technologies and concepts in relation to CPS like cloud computing, big data, fog computing, and crowd sourcing Includes topics related to CPS such as architecture, system, networking, application, algorithm, security and privacy

    標(biāo)簽: Cyber-Physical Systems

    上傳時間: 2019-04-21

    上傳用戶:danyun

  • GSM 03.48

    Digital cellular telecommunications system (Phase 2+); security mechanisms for SIM application toolkit; Stage 2 (3GPP TS 03.48 version 8.8.0 Release 1999)

    標(biāo)簽: GSM

    上傳時間: 2019-06-14

    上傳用戶:twogozi

  • Fundamental Limits on a Class of Secure

    Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.

    標(biāo)簽: Fundamental Limits Secure Class on of

    上傳時間: 2020-01-04

    上傳用戶:kddlas

  • Active+and+Programmable+Networks

    New applications such as video conferencing, video on demand, multi- media transcoders, Voice-over-IP (VoIP), intrusion detection, distributed collaboration, and intranet security require advanced functionality from networks beyond simple forwarding congestion control techniques. 

    標(biāo)簽: Programmable Networks Active and

    上傳時間: 2020-05-26

    上傳用戶:shancjb

  • Short-range+Wireless+Communication

    Developers, manufacturers and marketers of products incorporating short- range radio systems are experts in their fields—security, telemetry, medical care, to name a few. Often they add a wireless interface just to eliminate wires on an existing wired product. They may adapt a wireless subsystem, which is easy to integrate electrically into their system, only to find that the range is far short of what they expected, there are frequent false alarms, or it doesn’t work at all. It is for these adapters of wireless subsystems that this book is primarily intended.

    標(biāo)簽: Communication Short-range Wireless

    上傳時間: 2020-06-01

    上傳用戶:shancjb

  • Telecommunications Essentials Global Source

    In this updated and expanded edition of her excellent telecommunications primer, Lili explains in just the right detail everything you need to know to become fluent in this most important and fascinating industry. Besides including a satisfying amount of expert technical detail, the book also discusses equally crucial aspects of how communications technology affects society, culture, and politics. Electronic communications is changing the world for the better; learn from Lili's expertise how you, too, can participate in the revolution." Steve Riley, senior security strategist, Microsoft Corporation

    標(biāo)簽: Telecommunications Essentials Global Source

    上傳時間: 2020-06-01

    上傳用戶:shancjb

  • Service+Robotics+within+the+Digital+Home

    Over the past few decades there has been an exponential growth in service robots and smart home technologies, which has led to the development of exciting new products in our daily lives. Service robots can be used to provide domestic aid for the elderly and disabled, serving various functions ranging from cleaning to enter- tainment. Service robots are divided by functions, such as personal robots, field robots, security robots, healthcare robots, medical robots, rehabilitation robots and entertainment robots. A smart home appears “intelligent” because its embedded computers can monitor so many aspects of the daily lives of householders. For example, the refrigerator may be able to monitor its contents, suggest healthy alter- natives and order groceries. Also, the smart home system may be able to clean the house and water the plants.

    標(biāo)簽: Robotics Service Digital within Home the

    上傳時間: 2020-06-06

    上傳用戶:shancjb

  • Big+Data+Analytics+Strategies

    This is a practical book, to be sure, but it is also a book about hope and posi- tive change. I am quite sincere. The delivery of electricity is deeply rooted in the principle of universal access; when clean, reliable energy is available it contributes to poverty alleviation, improved social conditions, and enhanced economic development. In the developed world, we know this to be true. The digital fabric of our lives is a testimony to the importance of energy security. Across the globe, we have seen the vital contributions that electrification has brought to the development of economies and an enhanced quality of life. Nonetheless, this supreme engineering achievement has languished, and we are deeply challenged.

    標(biāo)簽: Strategies Analytics Data Big

    上傳時間: 2020-06-07

    上傳用戶:shancjb

  • Computational+Intelligence

    The large-scale deployment of the smart grid (SG) paradigm could play a strategic role in supporting the evolution of conventional electrical grids toward active, flexible and self- healing web energy networks composed of distributed and cooperative energy resources. From a conceptual point of view, the SG is the convergence of information and operational technologies applied to the electric grid, providing sustainable options to customers and improved security. Advances in research on SGs could increase the efficiency of modern electrical power systems by: (i) supporting the massive penetration of small-scale distributed and dispersed generators; (ii) facilitating the integration of pervasive synchronized metering systems; (iii) improving the interaction and cooperation between the network components; and (iv) allowing the wider deployment of self-healing and proactive control/protection paradigms.

    標(biāo)簽: Computational Intelligence

    上傳時間: 2020-06-07

    上傳用戶:shancjb

主站蜘蛛池模板: 蓬莱市| 林州市| 藁城市| 峨眉山市| 灵宝市| 泸水县| 洞口县| 利川市| 梅州市| 凤冈县| 双鸭山市| 泰兴市| 盘山县| 兴安盟| 广南县| 上虞市| 泸定县| 漳州市| 都匀市| 高陵县| 久治县| 万荣县| 长宁县| 衡阳县| 仪征市| 襄城县| 嘉义市| 姜堰市| 江川县| 清丰县| 齐齐哈尔市| 杭锦后旗| 布拖县| 乌兰察布市| 南澳县| 习水县| 宝兴县| 辽阳市| 富蕴县| 武夷山市| 襄樊市|