intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Security control

Xem 1-20 trên 105 kết quả Security control
  • This paper introduces the application of artificial intelligence to build a security control software system in local military units. This software system uses state-of-the-art convolutional neural networks (CNN SOTA) for facial recognition by testing two of the best facial recognition models currently available: the FaceNet model and the VGGFace model.

    pdf8p vifilm 11-10-2024 6 1   Download

  • In this article, we have researched, compared and evaluated current methods for solving problems such as data augmentation, data generation via generative networks and classing importance control. Additionally, we will also provide a brief overview of existing datasets for intrusion detection in wireless networks.

    pdf12p viyoko 01-10-2024 5 1   Download

  • For this aim, we propose to study a controlled fractional network-based SCIRS (Susceptible - Carrier - Infectious - Recovered - Susceptible) malware propagation model and its stabilization problem based on fractional interconnected TakagiSugeno fuzzy system.

    pdf11p viyoko 01-10-2024 2 1   Download

  • This thesis intends to develop application-level access control models to address several major security issues in enterprise environments. The first goal is to provide simple and efficient authorization specifications to reduce the complexity of security management. The second goal is to provide dynamic access control for Web service applications. The third goal is to provide an access control framework for Semantic Web services. In this thesis, an Authorization-Function-Based Role-based Access Control (FB-RBAC) model is proposed for controlling enterprise systems at the application level.

    pdf182p runthenight07 01-03-2023 12 3   Download

  • The organisation of the thesis will follow a seven-chapter structure. The researcher will use the term thesis as used by Perry (1994) to describe the entire work, while the related terms research and study will be used interchangeably when referring to the research undertaken in the thesis. This thesis could make a significant contribution to the social control literature by addressing these shortcomings and identifying and examining the formal and informal mechanisms used conjointly by the government and its agencies to control social security expenditures and also social outcomes.

    pdf350p runthenight04 02-02-2023 7 2   Download

  • Lecture "On safety and security of information systems: Access control" provide students with knowledge about: Four parts of access control; Types of access control; Formal models of access control;... Please refer to the detailed content of the lecture!

    pdf18p hoabingan205 12-12-2022 10 5   Download

  • Nối tiếp phần 1, tài liệu Xây dựng và triển khai ứng dụng thương mại điện tử (Tập 2): Phần 2 tiếp tục trình bày những nội dung về đối tượng của ADO.NET và List Controls; ASP.NET và XML; truy cập dữ liệu SQL server với định dạng XML; xây dựng và kết hợp Web services vào ASP.NET; tìm kiếm, phân trang, điều hướng kết quả tìm kiếm bằng ASP.

    pdf400p linyanjun_2408 24-03-2022 45 4   Download

  • This paper proposes a security framework for Internet of Things (IoT) based on blockchain. The solution provides the two features: (1) Access control for IoT devices, which allows users to pay a fee to the device’s owner to access the device for a certain period of time.

    pdf9p viaespa2711 31-07-2021 29 4   Download

  • Pest control practices in the vegetable crops have been heavily dominated by the routine use of broad-spectrum insecticides to control pests. Concerns have emerged about the adverse consequences of over use of pesticide. These consequences include short and longterm health hazards, contamination and environmental degradation. To minimize the pest losses farmers heavily depend on the chemical pesticides and accessing pest management information from the pesticide dealers due to weak state extension support system.

    pdf9p nguaconbaynhay5 16-05-2020 19 3   Download

  • In this research, a novel system is designed in scope of automated highways. The aim of this system is to provide safe, secure and fast transportation on highways. This system uses both road sensors and GNSS (Global Navigation Satellite System).

    pdf4p cathydoll5 27-02-2019 25 1   Download

  • Lecture SQL XML Security presentation of content: Web Data - protection requirements, dissemination policies, why XML, graph representation, the author-X Project, enforcing access control, protection object specification, propagation option,...

    ppt66p thangnamvoiva20 20-09-2016 49 5   Download

  • Bài giảng "Bảo mật cơ sở dữ liệu - Chương 3: Bảo mật theo cơ chế MAC" cung cấp cho người học các kiến thức: Define Mandatory Access Control Models, secrecy-preserving models, integrity-preserving models, multi-Level security, multi-level databases access control models,... Mời các bạn cùng tham khảo.

    ppt59p thangnamvoiva20 20-09-2016 91 8   Download

  • Bài giảng "Bảo mật cơ sở dữ liệu: Security models" trình bày các nội dung: Access control, types of Access control, mandatory access control, rules based access control, authentication methods, operating system authentication,... Mời các bạn cùng tham khảo.

    ppt141p thangnamvoiva20 20-09-2016 81 6   Download

  • Upon completion of this lesson, the successful participant will be able to: Understand the need for and importance of database administration; learn different ways of processing a database; understand the need for concurrency control, security, and backup and recovery; learn typical problems that can occur when multiple users process a database concurrently; understand the use of locking and the problem of deadlock;…

    ppt62p tangtuy17 11-07-2016 40 2   Download

  • This chapter summarize the operation of Ethernet as defined for 100/1000 Mbps LANs in the IEEE 802.3 standard. Explain the functions that enable a switch to forward Ethernet frames in a LAN. Configure a switch for operation in a network designed to support voice, video, and data transmissions. Configure basic security on a switch that will operate in a network designed to support voice, video, and data transmissions.

    pdf163p youcanletgo_01 04-01-2016 61 5   Download

  • In this chapter, you will learn to: Explain how ACLs are used to secure a medium-size enterprise branch office network, including the concept of packet filtering, the purpose of ACLs, how ACLs are used to control access, and the types of Cisco ACLs. Configure standard ACLs in a medium-size enterprise branch office network, including defining filtering criteria, configuring standard ACLs to filter traffic, and applying standard ACLs to router interfaces,...

    pdf86p youcanletgo_01 04-01-2016 61 5   Download

  • The following will be discussed in this chapter: Describle endpoint security with IronPort; describle endpoint security with Network Admission Control; describle endpoint Security with Cisco Security Agent; describle MAC address spoofing attacks, STP manipulation attacks, MAC address overflow attacks, LAN storm attacks, and VLAN attacks;...

    pdf143p youcanletgo_01 04-01-2016 75 5   Download

  • Chapter 4 objectives: Describe numbered and named, standard and extended IP ACLs, configure IP ACLs with IOS CLI and CCP, describe TCP established ACL functionality, describe and configure reflexive ACLs, describe and configure dynamic ACLs,... Inviting you to refer.

    pdf132p youcanletgo_01 04-01-2016 57 5   Download

  • Bài giảng chương 13 đề cập đến vấn đề bảo mật trong cơ sở dữ liệu. Chương này trình bày những nội dung chinh như: Introduction to database security, access control, discretionary access control, specifying privileges using views, revoking privileges, propagation of privileges using the grant option,... Mời các bạn cùng tham khảo.

    ppt72p kiepnaybinhyen_02 25-12-2015 61 4   Download

  • Bài giảng Bảo mật hệ thống thông tin: Chương 5 - Điều khiển truy cập bắt buộc (Mandatory Access Controls) sau đây sẽ giúp cho các bạn hiểu rõ hơn về điều khiển truy cập bắt buộc, mô hình điều khiển truy cập bắt buộc, Case study - Oracle Label Security.

    pdf66p cocacola_17 11-12-2015 115 12   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2