1–50 of 75 hits
|

    Defeating Ivan with TEMPEST (data security)

    Schultz, J.B. | Tema Archive | 1983
    Keywords: DATA PRIVACY , NATIONAL SECURITY AGENCY

    Logistic automation loading centre for petrochemicals

    Wit, C.A.A.M. de | Tema Archive | 1987
    Keywords: PASSWORD SECURITY SYSTEM , DIGITAL DATA COMMUNICATION MESSAGE PROTOCOL

    West's technical lead rests on export security control (command and control systems)

    Lubarsky, A.R. / Smith, L.T. jun. | Tema Archive | 1990
    Keywords: DATA PRIVACY , EXPORT SECURITY CONTROL

    Security for space power systems

    Kusic, G.L. / Allen, W.H. / Gholdston, E.W. et al. | Tema Archive | 1990
    Keywords: SYSTEM SECURITY MONITOR , DATA SCAN RATE

    A study on improvement of obscure video images

    Watanabe, A. | IET Digital Library Archive | 1997
    Keywords: police data processing , security video camera systems

    VQ-based digital image watermarking method

    Lu, Zhe-ming / Pan, Jeng-shyang / Sun, Sheng-he | IET Digital Library Archive | 2000
    Keywords: security , data compression , enhanced security

    Secure data logging solution for Dowty Propellers

    Emerald Group Publishing | 2003
    Keywords: Propellers,Manufacturing,Data security

    Homeland security, car crashes and traffic incident data: Killing three birds with one IT architecture

    Woodhall, Judith | Elsevier | 2005
    Keywords: Data interoperability , Homeland security

    GSR “DE” Series of digital recorders with removable drives

    Emerald Group Publishing | 2006
    Keywords: Data security , Data handling

    Designing a secure data communications system for automatic train control

    Bantin, C C / Siu, J | SAGE Publications | 2011
    Keywords: data security

    A Novel Framework for Efficient Mobility Data Verification in Vehicular Ad-hoc Networks

    Jaeger, Attila / Bißmeyer, Norbert / Stübing, Hagen et al. | Springer Verlag | 2011
    Keywords: Mobility data verification , Security

    Advanced traveller information systems for intelligent future mobility: the case of ‘AnachB’ in Vienna

    Go¨tzenbrucker, G. / Ko¨hl, M. | IET | 2012
    Keywords: security of data , data privacy

    Design of a Secure Electric Vehicle Charging Pile Control Device

    Zhai, Feng / Liu, Ying / Fu, Yi Lun | Trans Tech Publications | 2013
    Keywords: Data Encryption , Security Authentication

    Enhancing privacy in collaborative traffic-monitoring systems using autonomous location update

    Free access
    Amro, Belal / Saygin, Yucel / Levi, Albert | IET | 2013
    Keywords: computer network security , data quality , data privacy , VANET security properties

      Enhancing privacy in collaborative traffic‐monitoring systems using autonomous location update

      Free access
      Amro, Belal / Saygin, Yucel / Levi, Albert | Wiley | 2013
      Keywords: VANET security properties , computer network security , data privacy , data quality

    Evolving risk-based security: A review of current issues and emerging trends impacting security screening in the aviation industry

    Wong, Solomon / Brooks, Nina | Elsevier | 2015
    Keywords: Security , Aviation security , Security screening , Risk-based security , Transportation Security Administration , One-stop security , Data , Smart security

    Cloudthink: a scalable secure platform for mirroring transportation systems in the cloud

    Free access
    Wilhelm, Erik / Siegel, Joshua / Mayer, Simon et al. | BASE | 2015
    Keywords: data security

      Cloudthink: a scalable secure platform for mirroring transportation systems in the cloud

      Free access
      Wilhelm, Erik / Siegel, Joshua / Mayer, Simon et al. | BASE | 2015
      Keywords: data security

    Personal security in travel by public transport: the role of traveller information and associated technologies

    Free access
    Beecroft, Mark / Pangbourne, Kate | Wiley | 2015
    Keywords: security of data , personal security

      Personal security in travel by public transport: the role of traveller information and associated technologies

      Free access
      Beecroft, Mark / Pangbourne, Kate | IET | 2015
      Keywords: personal security , security of data

    Cloudthink: a scalable secure platform for mirroring transportation systems in the cloud

    Free access
    Erik Wilhelm / Joshua Siegel / Simon Mayer et al. | DOAJ | 2015
    Keywords: data security

    Prevalence and demographic differences in microaccidents and safety behaviors among young workers in Canada

    Turner, Nick | Online Contents | 2015
    Keywords: Accidents, Occupational - statistics & numerical data , Workplace - statistics & numerical data , Safety and security measures

    Privacy – aware average speed monitoring system for vehicular ad-hoc networks

    Free access
    Alcaide, Almudena / Palomar, Esther / Fuentes, José M. et al. | IET | 2015
    Keywords: telecommunication security , privacy preserving security protocol , data privacy

    Privacy – aware average speed monitoring system for vehicular ad‐hoc networks

    Free access
    Alcaide, Almudena / Palomar, Esther / Fuentes, José M. et al. | Wiley | 2015
    Keywords: privacy preserving security protocol , data privacy , telecommunication security

    Potential Cyberattacks on Automated Vehicles

    Petit, Jonathan | Online Contents | 2015
    Keywords: security , security of data

    A Video-Analysis-Based Railway-Road Safety System for Detecting Hazard Situations at Level Crossings

    Salmane, Houssam | Online Contents | 2015
    Keywords: intelligent security system , Security management , smart video surveillance security system , Dempster-Shafer data fusion technique , Security systems

    Public preference for data privacy – A pan-European study on metro/train surveillance

    Patil, Sunil / Patruni, Bhanu / Potoglou, Dimitris et al. | Elsevier | 2016
    Keywords: Data privacy , Security

    PERMUTATION-BASED POLYMORPHIC STEGO-WATERMARKS FOR PROGRAM CODES

    Free access
    Denys Samoilenko | DOAJ | 2016
    Keywords: data protection , information security

    Bayesian Analysis of Behaviors and Interactions for Situation Awareness in Transportation Systems

    Castaldo, Francesco | Online Contents | 2016
    Keywords: maritime security , Data models

    The evolution of Earth Observation satellites in Europe and its impact on the performance of emergency response services

    Denis, Gil / de Boissezon, Hélène / Hosford, Steven et al. | Elsevier | 2016
    Keywords: Coordinated Data Access System , Copernicus Space Component Data Access , Data Access Portfolio , Data Provider Node , Data Warehouse , Global Monitoring for Environment and Security (former name of Copernicus)

    What do we know about rail suicide incidents? An analysis of 257 fatalities on the rail network in Great Britain

    Ryan, Brendan | SAGE Publications | 2017
    Keywords: incident data , security

    Gini Coefficient for Voltage Security Assessment of Multi-stage Transmission Expansion Planning

    Luo, Yi | Online Contents | 2017
    Keywords: voltage security deviation Gini coefficient , Security , Data encryption , voltage security Lorenz curve , voltage security risk , voltage security risk index , voltage security analysis , voltage security modeling

    Study of Automatic Anomalous Behaviour Detection Techniques for Maritime Vessels

    Abdoulaye Sidibé | Online Contents | 2017
    Keywords: Security , Data mining , Data , Big Data

    Distributed Aggregate Privacy-Preserving Authentication in VANETs

    Zhang, Lei | Online Contents | 2017
    Keywords: security , Data compression

    Going broadband

    Henry Canaday | Online Contents | 2017
    Keywords: Computer information security , Weather data

    The need for detailed gender-specific occupational safety analysis

    Rios, Fernanda Cruz | Online Contents | 2017
    Keywords: Safety and security measures , Data processing

    VLSI Design of Trusted Virtual Sensors

    Free access
    Martínez-Rodríguez, Macarena, C. / Prada-Delgado, Miguel A. / Brox, Piedad et al. | BASE | 2018
    Keywords: Data security , Hardware security

    Police‐less multi‐party traffic violation detection and reporting system with privacy preservation

    Free access
    Özkul, Mükremin / Çapuni, Ilir | Wiley | 2018
    Keywords: security of data , data privacy

      Police-less multi-party traffic violation detection and reporting system with privacy preservation

      Free access
      Özkul, Mükremin / Çapuni, Ilir | IET | 2018
      Keywords: security of data , data privacy

    Assessment of ITS architectures

    Free access
    Fünfrocken, Manuel / Otte, Andreas / Vogt, Jonas et al. | Wiley | 2018
    Keywords: security of data

      Assessment of ITS architectures

      Free access
      Fünfrocken, Manuel / Otte, Andreas / Vogt, Jonas et al. | IET | 2018
      Keywords: security of data

    Diffie–Hellman process and its use in secure and authenticated VC networks

    Free access
    Panagiotopoulos, Ilias / Dimitrakopoulos, George | IET | 2018
    Keywords: security concern , data privacy , telecommunication security

      Diffie–Hellman process and its use in secure and authenticated VC networks

      Free access
      Panagiotopoulos, Ilias / Dimitrakopoulos, George | Wiley | 2018
      Keywords: telecommunication security , security concern , data privacy

    Merging safety and cybersecurity analysis in product design

    Free access
    Suo, Dajiang / Siegel, Joshua E. / Sarma, Sanjay E. | IET | 2018
    Keywords: security of data

      Merging safety and cybersecurity analysis in product design

      Free access
      Suo, Dajiang / Siegel, Joshua E. / Sarma, Sanjay E. | Wiley | 2018
      Keywords: security of data

    Early warning of burst passenger flow in public transportation system

    Wang, Haiyang / Li, Longyuan / Pan, Pingjun et al. | Elsevier | 2019
    Keywords: Smartcard data , Public security

    Cyber-physical security and safety of autonomous connected vehicles:optimal control meets multi-armed bandit learning

    Free access
    Ferdowsi, A. (Aidin) / Ali, S. (Samad) / Saad, W. (Walid) et al. | BASE | 2019
    Keywords: cyber-physical security , data injection attack

    Beacon trust management system and fake data detection in vehicular ad-hoc networks

    Free access
    Arshad, Muhammad / Ullah, Zahid / Khalid, Muhammad et al. | IET | 2019
    Keywords: computer network security , malicious data detection scheme , fake data detection scheme , trust-based data detection scheme

      Beacon trust management system and fake data detection in vehicular ad‐hoc networks

      Free access
      Arshad, Muhammad / Ullah, Zahid / Khalid, Muhammad et al. | Wiley | 2019
      Keywords: fake data detection scheme , malicious data detection scheme , trust‐based data detection scheme , computer network security

    ISRF: interest semantic reasoning based fog firewall for information‐centric Internet of Vehicles

    Free access
    Liu, Yi / Wu, Jun / Li, Jianhua et al. | Wiley | 2019
    Keywords: content big data , Big Data , computer network security

      ISRF: interest semantic reasoning based fog firewall for information-centric Internet of Vehicles

      Free access
      Liu, Yi / Wu, Jun / Li, Jianhua et al. | IET | 2019
      Keywords: computer network security , Big Data , content big data

    Driving behaviour characterisation by using phase‐space reconstruction and pre‐trained convolutional neural network

    Free access
    He, Xin / Xu, Li / Zhang, Zhe | Wiley | 2019
    Keywords: public security , raw vehicle test data

      Driving behaviour characterisation by using phase-space reconstruction and pre-trained convolutional neural network

      Free access
      He, Xin / Xu, Li / Zhang, Zhe | IET | 2019
      Keywords: public security , raw vehicle test data

    Verifying driver performance for heavy haulage fatigue management

    Free access
    Vo, Son Anh / Mirowski, Luke / Scanlan, Joel et al. | Wiley | 2019
    Keywords: security of data

      Verifying driver performance for heavy haulage fatigue management

      Free access
      Vo, Son Anh / Mirowski, Luke / Scanlan, Joel et al. | IET | 2019
      Keywords: security of data

    Efficient data handover and intelligent information assessment in software-defined vehicular social networks

    Free access
    Sohail, Muhammad / Wang, Liangmin / Ali, Rashid et al. | IET | 2019
    Keywords: efficient data handover , telecommunication security

      Efficient data handover and intelligent information assessment in software‐defined vehicular social networks

      Free access
      Sohail, Muhammad / Wang, Liangmin / Ali, Rashid et al. | Wiley | 2019
      Keywords: efficient data handover , telecommunication security

    Value of data meets IT security – assessing IT security risks in data-driven value chains

    Bitomsky, Laura / Bürger, Olga / Häckel, Björn et al. | Online Contents | 2020
    Keywords: Data security , Data-driven value creation , Value of data , IT security

    Internet of things assisted public security management platform for urban transportation using hybridised cryptographic‐integrated steganography

    Free access
    Dexu Bi / Seifedine Kadry / Priyan Malarvizhi Kumar | DOAJ | 2020
    Keywords: public security management platform , secure data sharing , data security

    Internet of things assisted public security management platform for urban transportation using hybridised cryptographic-integrated steganography

    Free access
    Bi, Dexu / Kadry, Seifedine / Kumar, Priyan Malarvizhi | IET | 2020
    Keywords: cryptography converts data , secured data , secret data , secure data sharing , data privacy , data security , cloud data , efficient data , auxiliary data inputs , confidential data , data integrity , public security management platform

      Internet of things assisted public security management platform for urban transportation using hybridised cryptographic‐integrated steganography

      Free access
      Bi, Dexu / Kadry, Seifedine / Kumar, Priyan Malarvizhi | Wiley | 2020
      Keywords: data integrity , data privacy , public security management platform , secure data sharing , data security , auxiliary data inputs , secured data , cloud data , cryptography converts data , secret data , confidential data , efficient data