Showing 4,941 - 4,959 results of 4,959 for search '"defense technology"', query time: 0.23s Refine Results
  1. 4941

    Survey on Backdoor Attacks and Countermeasures in Deep Neural Network by QIAN Hanwei, SUN Weisong

    Published 2023-05-01
    “…This paper summarizes the existing backdoor defense technologies from the perspective of attack and defense confrontation, which include poisoned sample identifying, poisoned model identifying, poisoned test sample filtering, and others. …”
    Get full text
    Article
  2. 4942
  3. 4943

    Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection by Majjed Al-Qatf, Yu Lasheng, Mohammed Al-Habib, Kamal Al-Sabahi

    Published 2018-01-01
    “…Network intrusion detection systems (NIDSs) provide a better solution to network security than other traditional network defense technologies, such as firewall systems. The success of NIDS is highly dependent on the performance of the algorithms and improvement methods used to increase the classification accuracy and decrease the training and testing times of the algorithms. …”
    Get full text
    Article
  4. 4944
  5. 4945
  6. 4946

    Development of an unmanned vehicle by Goh, Khim Hui.

    Published 2010
    “…It also involves high technology equipments in order to achieve a higher level of defense. Technologies not only boost the efficiency of security but it also empowers us to become more responsive. …”
    Get full text
    Final Year Project (FYP)
  7. 4947
  8. 4948

    Engineering Psychology in the Cultural Context of the Soviet Science of the 1960s: The Experience of Boris Lomov’s Research Program by V. I. Konnov

    Published 2020-12-01
    “…The infusion of psychological approaches in the evolution of such systems was predetermined by the fact that the new defense technologies were operating at greatly increased speed, thus rendering significant even marginal psychological factors. …”
    Get full text
    Article
  9. 4949
  10. 4950
  11. 4951
  12. 4952
  13. 4953
  14. 4954

    Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology by Hailong MA, Tao HU, Yiming JIANG, Yanze QU, Liang WANG

    Published 2022-04-01
    “…Build upon the dynamic-heterogeneous-redundant architecture for multi-body execution, multi-mode ruling and multi-dimension reconstruction, cyberspace mimic defense (CMD) uses uncertain system to deal with the uncertain threat to cyberspace ubiquity.The evolution of CMD over the past 8 years were reviewed systematically from the vertical, horizontal, current, developing and future perspectives.From the vertical perspective, the development process of CMD from concept to theory and practice was summarized.From the horizontal view, it elaborated the core structure DHR (dynamical heterogeneous redundancy) of CMD, the principles based on CMD’s three major theorems, safety gains and performance costs.A comparison was conducted between CMD and five other active defense technologies, namely intrusion tolerance, moving target defense, zero trust architecture, trusted computing and computer immunology.From the current perspective, it reviewed the implementation elements, performance, system architecture, heterogeneous strategies, scheduling strategies, voting strategies and other common technology patterns and characteristics of 11 types of main existing mimic products including mimicry router, mimicry processor, mimicry DNS server and mimicry cloud platform.From the developing perspective, it explored the “mimic+” AICDS (Mimic + AI/IoT/Cloud/Data/SDN) symbiotic ecology with respect to 5 types of new technologies, namely artificial intelligence, Internet of things, cloud computing, big data and software-defined network, and proposed the corresponding technology junctions and cross research value.From the future perspective, it looked into the future mimicry baseline 2.0 product ecology, “mimic +5G/6G”, “mimic + edge computing”,“mimic + cloud” and “mimic + blockchain” application scenarios.Besides, 4 types of challenges faced by CMD in the future were analyzed and summarized, including escape space of multi-mode decision attack, mutual restriction of heterogeneous and synchronous, difficult balance between security and function, and limited transformation space of existing endogenous security components.…”
    Get full text
    Article
  15. 4955
  16. 4956

    Analysis of the Types of Collaboration Networks in the Defense Innovation Process by Fateme Mashhadi Hajiali, Seyed Mehdi Alvani, Mohammad javad Kameli, Gholamreza Memarzade Tehran

    Published 2020-05-01
    “…In this way, it can direct the innovative processes by presenting defense needs, evaluating existing technologies and providing suggestions for improving defense technologies (Beigi and Alim Mohammadi, 2015). Military centers are one of the key parts of any country, because ultimately the security, authority and peace of mind of each country is achieved with their help. …”
    Get full text
    Article
  17. 4957

    The ODL African Continental Education Strategy: Anchoring AI/Machine Learning on the African Technological Innovation and Investment Table by Gabriel Kabanda

    Published 2022-12-01
    “…The commercialization of priority projects for strategic investment included post-harvest technologies, small-scale mining, mineral value addition, and bio-mining, clean water alternatives, mining waste-derived tile technologies, ICT innovations in machine learning and cybersecurity, and defense technologies. To direct the installation of upcoming cybersecurity systems in Africa, a Bayesian Network model for cybersecurity was developed. …”
    Get full text
    Article
  18. 4958
  19. 4959

    Identifying and Prioritizing Policies for Deploying Dual-Purpose Technologies in Iran by Amirmohammad Sharifi, Alireza Moeini, Mahdi Abdolhamid

    Published 2021-05-01
    “…The challenges below reflect the situation face by the defense industries: The need to maintain the capacity of restructuring in case of occurrence of future threats; The need to be competitive in the commercial sector through development and introducing the product more rapidly; Increasing the global access to advance defense technologies. Given the above-mentioned challenges and the high costs of defense technologies and studies on the one hand and the budget cuts in the centralized economic systems on the other hand, defense industries require taking serious measures in order to deal with this problem. …”
    Get full text
    Article