Showing 1 - 20 results of 4,959 for search '"defense technology"', query time: 0.56s Refine Results
  1. 1
  2. 2
  3. 3

    Overview of blockchain assets theft attacks and defense technology by Beiyuan YU, Shanyao REN, Jianwei LIU

    Published 2023-02-01
    “…Since Satoshi Nakamoto’s introduction of Bitcoin as a peer-to-peer electronic cash system, blockchain technology has been developing rapidly especially in the fields of digital assets transferring and electronic currency payments.Ethereum introduced smart contract code, giving it the ability to synchronize and preserve the execution status of smart contract programs, automatically execute transaction conditions and eliminate the need for intermediaries.Web3.0 developers can use Ethereum’s general-purpose programmable blockchain platform to build more powerful decentralized applications.Ethereum’s characteristics, such as central-less control, public and transparent interaction data guaranteed by smart contracts, and user-controlled data, have attracted more attentions.With the popularization and application of blockchain technology, more and more users are storing their digital assets on the blockchain.Due to the lack of regulatory and governance authority, public chain systems such as Ethereum are gradually becoming a medium for hackers to steal digital assets.Generally, fraud and phishing attacks are committed using blockchain to steal digital assets held by blockchain users.This article aims to help readers develop the concept of blockchain asset security and prevent asset theft attacks implemented using blockchain at the source.The characteristics and implementation scenarios of various attacks were effectively studied by summarizing the asset theft attack schemes that hackers use in the blockchain environment and abstracting research methods for threat models.Through an in-depth analysis of typical attack methods, the advantages and disadvantages of different attacks were compared, and the fundamental reasons why attackers can successfully implement attacks were analyzed.In terms of defense technology, defense schemes were introduced such as targeted phishing detection, token authorization detection, token locking, decentralized token ownership arbitration, smart contract vulnerability detection, asset isolation, supply chain attack detection, and signature data legitimacy detection, which combine attack cases and implementation scenarios.The primary process and plans for implementation of each type of defense plan were also given.And then it is clear which protective measures can protect user assets in different attack scenarios.…”
    Get full text
    Article
  4. 4

    New collaborative DDoS defense technology based on NFV by XU Chuanfeng, LIN Hui, GUO Xuancheng, WANG Xiaoding

    Published 2019-04-01
    “…Simulation results show that the new collaborative DDoS attack defense technology outperforms existing solutions in terms of packet loss rate, cooperation, and resource allocation rate, improving the effectiveness of DDoS attack defense.…”
    Get full text
    Article
  5. 5

    Review of Artificial Intelligence Adversarial Attack and Defense Technologies by Shilin Qiu, Qihe Liu, Shijie Zhou, Chunjiang Wu

    Published 2019-03-01
    “…This paper aims to comprehensively summarize the latest research progress on adversarial attack and defense technologies in deep learning. According to the target model’s different stages where the adversarial attack occurred, this paper expounds the adversarial attack methods in the training stage and testing stage respectively. …”
    Get full text
    Article
  6. 6

    Explaining the Role of Strategic Planning in Future Defense Technology Development by حسن امیری, Rreza Rahmati, mohamadali ranjbar

    Published 2016-08-01
    “…Then by using the SWOT analysis, the competitive, adaptive and defensive strategies affecting the growth and development of future defense technology were explained and the position of the defense industry was analyzed in order to employ the most effective strategies.…”
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Computer Security Active Defense Technology Based on Bayesian Model by Liu Zhiyu, Ma Baoying, Xing Jun, Cao Wangcheng

    Published 2023-07-01
    “…The existing active defense technology based on game theory is mainly based on static games. …”
    Get full text
    Article
  10. 10
  11. 11

    5th International Conference OTEH 2012 - defense technology (Proceedings review) by Vlado Petar Đurković

    Published 2013-02-01
    “…<p>This article gives an overview of all papers and events at the Fifth International ScientificConference on Defense Technologies OTEH 2012 held in Belgrade, in the Military Technical Institute (VTI), from 18<sup>th</sup> to 19<sup>th</sup> September 2012.…”
    Get full text
    Article
  12. 12
  13. 13

    Strategic foresight for defensive technologies in the field of Army Air Defense of the Islamic Republic of Iran on 1420 horizon by Ebrahim Ijabi, Farhad Dervishi she talani, Hosein Minaie, Safar Fazli, Ainolah Keshavarz

    Published 2019-11-01
    “…This paper aims to review and analyze the foundations, concepts, definitions and models of foresight and strategic foresight provided by experts, in order to extract the dimensions, components and key items and finally intreduce steps of strategic foresight for defensive technology in the field of army air defense of the Islamic Republic of Iran. …”
    Get full text
    Article
  14. 14

    Designing a strategic foresight framework for defensive technologies in the field of air defense using interpretive structural modeling by Ebrahim Ijabi, Farhad Dervish she talani, Hossein Minaie, Safar Fazli, Ainolah Keshavarz

    Published 2020-05-01
    “…For this purpose, by using an interpretive structural modeling method, the opinion of 25 experts was received, and within seven steps of ISM method, each of the stages of the strategic foresight framework of air defense technologies were sorted. According to the output of interpretive structural models, The pre-foresight step includes Five levels and thirteen steps, the specifying inputs step includes nine levels and seventeen steps, the foresight step includes five levels and eleven steps, the output step includes two levels and seven steps and the step of developing strategies includes four levels and ten steps.  …”
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    The Mediating Effects of Adaptability Culture on the Relationship Between Transformational Leadership and Organizational Innovation (The Case of Selected Firms in Supply Chain of Defense Technologies by Moammad Ebrahim Sanjaghi, Borzoo Farrahi Boozanjani, Sayed Mahdi Hosseini Sarkhoosh, Jamal Haji Shafiei

    Published 2011-12-01
    “…Hence this study attempts to investigate the impact of transformational leadership and adaptability culture upon organizational innovation in the context of selected firms in supply chain of defense technologies. Using the structural equation modeling technique, results from the analysis of data from 217 collected questionnaires indicate that transformational leadership, beyond its direct influence, exerts indirect impact upon organizational innovation through the mediation of adaptability culture and that the extent of indirect effect is significantly higher than that of direct one. …”
    Get full text
    Article
  18. 18
  19. 19
  20. 20