
Application security
-
This paper explores the applications of Big Data in business network analysis, focusing on how it enhances supply chain visibility, risk management, and demand forecasting. It also addresses challenges like data privacy, security, and managing large datasets.
11p
vijiraiya
19-05-2025
2
2
Download
-
Lecture Cryptography: Cryptology Overviews introduces the fundamental concepts of cryptography and its applications. The lecture explores core terminologies, classical cipher systems, and the evolution of algorithms in cryptographic science. It sets the stage for understanding the practical use of cryptography in securing information. Please refer to the lecture for more details!
60p
hoatrongguong03
15-05-2025
2
1
Download
-
Lecture Cryptography: Cryptography Applications (Part 1) introduces real-world applications of cryptographic principles in authentication, key negotiation, and secure protocols. Topics include SSL/TLS, IPSec, SSH, and Kerberos. The lecture emphasizes practical implementation in networks and systems. Please refer to the lecture for more details!
62p
hoatrongguong03
15-05-2025
4
1
Download
-
Lecture Cryptography: Cryptography Applications (Part 2) explores modern applications of cryptography in blockchain systems. It covers secure transactions, consensus mechanisms, and network architecture. This lecture illustrates how cryptography underpins the security and trust of decentralized platforms. Please refer to the lecture for more details!
46p
hoatrongguong03
15-05-2025
3
1
Download
-
Using case study method in National Defense - Security Education at high schools in Ho Chi Minh city
This study examines the implementation of the case study method in teaching National Defense - Security Education in Ho Chi Minh City high schools. A survey of 50 teachers and 200 students from three high schools reveals that while the case study method has been introduced, its application remains limited, with an average score of 3.19.
10p
viling
11-10-2024
1
1
Download
-
This paper introduces the application of artificial intelligence to build a security control software system in local military units. This software system uses state-of-the-art convolutional neural networks (CNN SOTA) for facial recognition by testing two of the best facial recognition models currently available: the FaceNet model and the VGGFace model.
8p
vifilm
11-10-2024
6
1
Download
-
In recent years, landslides are taking place very seriously, and tend to increase in both scope and scale, threatening people's lives and properties. Therefore, timely detection of landslide areas is extremely important to minimize damage. In this paper, an improved algorithm for partitioning data with reliability problems using multiple fuzzifiers named as TSSFC is introduced.
9p
viengfa
28-10-2024
5
2
Download
-
At present, artificial intelligence (Al) is one of the most rapidly developing fields in science and technology. In the modern context, Al technologies have become a highly researched area globally, leading to breakthrough technologies that enhance efficiency and effectiveness across various sectors, including environmental security.
15p
viuzumaki
28-03-2025
4
1
Download
-
This paper systematically presents a specific application of linear algebra in information security and cryptography, highlighting the crucial role of matrix operations and linear techniques in the design and analysis of encryption algorithms.
8p
viaburame
14-03-2025
5
1
Download
-
In this study, we propose a NOMA communication model combined with linear array antennas for the purpose of enhancing physical layer security. We introduce a model of 4 nodes: transmitter node S, receiver node D1, receiver node D2, eavesdropping node E.
10p
viling
11-10-2024
2
1
Download
-
Efficient and accurate recognition of human interactions is crucial for numerous service applications, including security surveillance and public safety. In this paper, we propose a lightweight methodology for detecting human activity and interactions in video streams, specifically tailored for edge computing environments.
10p
viyamanaka
06-02-2025
3
2
Download
-
Recent attacks, infections, and malicious code are mostly exploited by hackers as a potential vulnerability on unsecured user computers. The issue for administrators is how to protect hundreds of computers within the organization from such insecurity.
6p
tuetuebinhan000
23-01-2025
3
2
Download
-
Photoluminescent composites that are air-stable and water-resistant are important for outdoor applications such as road marking paints, light-converting membranes, fluorescent paints, and security inks.
7p
vibenya
31-12-2024
4
2
Download
-
PHP-Developer since the late 1920s I 2009 I tried out about 10(!!) different PHP Frameworks: Akelos PHP Framework Cake PHP Codeigniter Kahona Recess Solar Symfony1 Wombat Yii Zend Framework Database Access Objects (DAO), Query Builder, AR I Migration system to step up and down your migrations I Easy Console Applications I Routing you always wanted to have I Flexibility with Widgets (= View Helpers++) I Expandable with Extensions / Wrappers for 3rd party libs I Highly secure I Scaffolding...
42p
nguyenvanhabk
22-06-2013
98
10
Download
-
“ Web 2.0 is a massive social experiment This is an opportunity to build a new kind of international understanding, not politician to politician, great man to great man, but citizen to citizen, person to person. It's a chance for people to look at a computer screen and really, genuinely wonder who's out there looking back at them. ”
54p
hanthegiankid9x
25-06-2013
54
5
Download
-
Chapter 1: Undertanding the .NET Framework overview .NET Framework; understanding the common language runtime; understanding the managed excution process; understanding assemblies and the global assembly cache; cogfiguration and security; application domains and run times hosts.
35p
cocacola_09
23-11-2015
63
3
Download
-
Lecture "Database security and auditing - Protecting data integrity and accessibility - Chapter 9: Auditing database activities" presentation of content: Audit server activities with Microsoft SQL Server 2000, audit database activities using Microsoft SQL Profiler, use SQL Server for security auditing. Mời các bạn tham khảo.
46p
thangnamvoiva20
20-09-2016
83
3
Download
-
Lecture Database security and auditing - Protecting data integrity and accessibility - Chapter 8: Application Data Auditing presentation of content Create and implement Oracle triggers, create and implement SQL Server triggers, define and implement Oracle fine-grained auditing,... Mời các bạn cùng tham khảo.
37p
thangnamvoiva20
20-09-2016
66
2
Download
-
Lecture Security+ Certification: Chapter 9 - System hardening. The main contents of this chapter include all of the following: Disable nonessential systems, harden operating systems, harden applications, harden networks.
39p
nhanmotchut_3
20-10-2016
77
5
Download
-
Bài giảng "An toàn mạng máy tính nâng cao - Chương 6: Web application security" cung cấp cho người học các kiến thức về bảo mật ứng dụng Web, web application attack and defense. Đây là một tài liệu hữu ích dành cho các bạn sinh viên và những ai quan tâm dùng làm tài liệu học tập và nghiên cứu.
51p
tieu_vu12
03-07-2018
109
15
Download
CHỦ ĐỀ BẠN MUỐN TÌM
