Mix of technologies key to increased security

被引:0
|
作者
Phillips, EH
机构
来源
AVIATION WEEK & SPACE TECHNOLOGY | 1996年 / 145卷 / 15期
关键词
D O I
暂无
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
引用
收藏
页码:50 / 52
页数:3
相关论文
共 50 条
  • [21] Security as a key factor for the smart city, citizens' trust, and the use of technologies
    Romani, Giulie Furtani
    Contreras Pinochet, Luis Hernan
    Pardim, Vanessa Itacaramby
    de Souza, Cesar Alexandre
    REVISTA DE ADMINISTRACAO PUBLICA, 2023, 57 (02):
  • [22] Research Progress of Network Security Architecture and Key Technologies Based on Blockchain
    Xu K.
    Ling S.-T.
    Li Q.
    Wu B.
    Shen M.
    Zhang Z.-C.
    Yao S.
    Liu X.
    Li L.
    Jisuanji Xuebao/Chinese Journal of Computers, 2021, 44 (01): : 55 - 83
  • [23] Research on the Key Technologies of Network Security-Oriented Situation Prediction
    Zhu, Yikun
    Du, Zhiling
    SCIENTIFIC PROGRAMMING, 2021, 2021
  • [24] Research on Key Technologies of Network Security Multidimensional Dynamic Risk Assessment
    Jiang Ming
    Li Ming
    Cai Mengchen
    Fang Yuan
    2018 7TH INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS AND COMPUTER SCIENCE (ICAMCS 2018), 2019, : 389 - 393
  • [25] Cyber security in New SpaceAnalysis of threats, key enabling technologies and challenges
    M. Manulis
    C. P. Bridges
    R. Harrison
    V. Sekar
    A. Davis
    International Journal of Information Security, 2021, 20 : 287 - 311
  • [26] Research on the Key Technologies of Security and Privacy Protection in Big Data Life Cycle
    He, Xiaosong
    Ma, Kai
    Huang, Jie
    He, Hongjing
    PROCEEDINGS OF 2024 INTERNATIONAL CONFERENCE ON COMPUTER AND MULTIMEDIA TECHNOLOGY, ICCMT 2024, 2024, : 296 - 299
  • [27] Holographic Images for Digital Security Control: Definition, Basic Framework and Key Technologies
    Wang B.
    Zhang Y.
    Qi D.
    Ma F.
    Dong X.
    Gaodianya Jishu/High Voltage Engineering, 2023, 49 (08): : 3335 - 3345
  • [28] Research on Key Technologies of Network Security Situational Awareness for Attack Tracking Prediction
    KOU Guang
    WANG Shuo
    TANG Guangming
    Chinese Journal of Electronics, 2019, 28 (01) : 162 - 171
  • [29] Cyber security in New Space Analysis of threats, key enabling technologies and challenges
    Manulis, M.
    Bridges, C. P.
    Harrison, R.
    Sekar, V
    Davis, A.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (03) : 287 - 311
  • [30] Research on Key Technologies of Multimedia Data Security Protection Based on Cloud Computing
    Yang, Tingting
    Jia, Shuwen
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON MODELING, SIMULATION AND OPTIMIZATION TECHNOLOGIES AND APPLICATIONS (MSOTA2016), 2016, 58 : 323 - 325