Advertisement

Topics

PubMed Journals Articles About "Tenable Network Security" RSS

05:08 EDT 20th July 2018 | BioPortfolio

Tenable Network Security PubMed articles on BioPortfolio. Our PubMed references draw on over 21 million records from the medical literature. Here you can see the latest Tenable Network Security articles that have been published worldwide.

More Information about "Tenable Network Security" on BioPortfolio

We have published hundreds of Tenable Network Security news stories on BioPortfolio along with dozens of Tenable Network Security Clinical Trials and PubMed Articles about Tenable Network Security for you to read. In addition to the medical data, news and clinical trials, BioPortfolio also has a large collection of Tenable Network Security Companies in our database. You can also find out about relevant Tenable Network Security Drugs and Medications on this site too.

Showing "Tenable Network Security" PubMed Articles 1–25 of 4,700+

A decoy chain deployment method based on SDN and NFV against penetration attack.

Penetration attacks are one of the most serious network security threats. However, existing network defense technologies do not have the ability to entirely block the penetration behavior of intruders. Therefore, the network needs additional defenses. In this paper, a decoy chain deployment (DCD) method based on SDN+NFV is proposed to address this problem. This method considers about the security status of networks, and deploys decoy chains with the resource constraints. DCD changes the attack surface of th...


ADVANCED SURVEILLANCE OF ENVIROMENTAL RADIATION IN AUTOMATIC NETWORKS.

The objective of this study is the verification of the operation of a radiation monitoring network conformed by several sensors. The malfunction of a surveillance network has security and economic consequences, which derive from its maintenance and could be avoided with an early detection. The proposed method is based on a kind of multivariate distance, and the verification for the methodology has been tested at CIEMAT's local radiological early warning network.

Utilising a multi-item questionnaire to assess household food security in Australia.

Currently, two food sufficiency questions are utilised as a proxy measure of national food security status in Australia. These questions do not capture all dimensions of food security and have been attributed with underreporting of the problem. The purpose of this study was to investigate food security using the short form of the US Household Food Security Survey Module (HFSSM) within an Australian context; and explore the relationship between food security status and multiple socio-demographic variables.


Attachment security priming: a systematic review.

Attachment security priming has been used to shed light on the cognitive processes related to attachment internal working models as well as the cognitive substrates of people's attachment-related affect and behavior. Security primes activate a sense of attachment security by making mental representations in one's memory more accessible and salient. In the current paper, we report on a qualitative synthesis of 20 studies published in the last two years to determine the effects of security priming. We found t...

From performance to performativity: The legitimization of US security contracting and its consequences.

Discussions about the legitimacy of private security companies (PSCs) in multilateral military interventions abound. This article looks at how the United States has sought to legitimize the outsourcing of security services to PSCs through performance-based contracting and performance assessments. Both mechanisms aim to demonstrate the effective provision of publicly desirable outcomes. However, the immaterial and socially constructed nature of security presents major problems for performance assessments in ...

Walking a security tightrope: relationship-induced changes in attachment security.

Little is known about how romantic relationships enhance long-term attachment security. Change is likely to involve revising deep-seated beliefs and expectations regarding one's self as being unworthy and others as untrustworthy (insecure internal working models). When individuals become anxious, partners can provide immediate reassurance, but the path to long-term security may hinge on addressing the individual's insecure self-perceptions; when individuals become avoidant, partners can 'soften' interaction...

Medical cyber-physical systems: A survey.

Medical cyber-physical systems (MCPS) are healthcare critical integration of a network of medical devices. These systems are progressively used in hospitals to achieve a continuous high-quality healthcare. The MCPS design faces numerous challenges, including inoperability, security/privacy, and high assurance in the system software. In the current work, the infrastructure of the cyber-physical systems (CPS) are reviewed and discussed. This article enriched the researches of the networked Medical Device (MD)...

A two-stage flow-based intrusion detection model for next-generation networks.

The next-generation network provides state-of-the-art access-independent services over converged mobile and fixed networks. Security in the converged network environment is a major challenge. Traditional packet and protocol-based intrusion detection techniques cannot be used in next-generation networks due to slow throughput, low accuracy and their inability to inspect encrypted payload. An alternative solution for protection of next-generation networks is to use network flow records for detection of malici...

Food Security and its Related Factors in the Rural Households of Bam City in Iran: A Logistic Regression Model Approach.

Awareness of the food security status of rural population and its influencing factors is essential for policy makers, public health institutions and the development of rural programs. This descriptive cross-sectional study was conducted in 2017 on 384 rural households in Bam city. The data was collected via the 6-item USDA questionnaire. Logistic regression was used to determine the relationship between social, economic and health factors with food security. The results indicate that 35.67% of households ha...

On the security of consumer wearable devices in the Internet of Things.

Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connec...

Information technology as a tool for the Italian Institute of Social Security (INPS) in the management of social security and civil disability: Pro and cons.

We examine, from a medical-legal perspective, the pro and cons of the information technology procedures that the Italian Institute of Social Security (INPS) has implemented to manage the provision of social disability assistance, meaning that separate from the payment of pension contributions, being welfare, anchored to an administrative requirement by way of the compulsory payment of a minimum social security contribution.

A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks.

The Internet of things (IoT) is composed of billions of sensing devices that are subject to threats stemming from increasing reliance on communications technologies. A Trust-Based Secure Routing (TBSR) scheme using the traceback approach is proposed to improve the security of data routing and maximize the use of available energy in Energy-Harvesting Wireless Sensor Networks (EHWSNs). The main contributions of a TBSR are (a) the source nodes send data and notification to sinks through disjoint paths, separat...

Updating energy security and environmental policy: Energy security theories revisited.

The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and...

BPC: from security advances to the risk of social security reform.

This paper analyzes the proposed changes in the Continuous Cash Benefit (BPC) discussed within the Social Security Reform, both with regard to the Federal Government's original proposal in 2016 and the proposal by the rapporteur's project submitted to Congress in 2017. The proposed changes focus on two aspects: increased minimum age of access and unlinking the BPC amount from the minimum wage amount. The document discusses the justifications for the BPC reform, regarding both disincentives to social securit...

Analyzing Cyber-Physical Threats on Robotic Platforms.

Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequence...

Displacement of social security and social disprotection in Brazil.

After 30 years in force, CF-88 must be salvaged and commemorated but also evaluated in relation to how much social and political resistance it acquired in the execution of its determinations. These determinations not only conflict with those of the dictatorial period preceding it but were also shown to be minimally attractive to neoliberal forces in Brazil in the late 1980s and early 1990s and are now widely recognized as conservative. One of the main recommendations of CF-88 - the subject of this article -...

Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.

The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the conf...

Synthesizing water quality indicators from standardized geospatial information to remedy water security challenges: A review.

Water is vital not only for food, energy and sanitation but also for ecosystem functioning, human health, socio-economic progress and poverty reduction. Water security exists when all people have physical and economical access to sufficient, safe, and clean water that meets basic needs. However, water security is threatened by growing human population, episodic environmental disasters, indiscriminate land management practices, contaminants, and escalation in geopolitical conflicts.

What is the Best Surgeon's Knot ? Evaluation of the Security of the Different Laparoscopic Knot Combinations.

To investigate the security of various knot combinations in laparoscopic surgery.

Public Health Communication: A Vital Component of Health Security.

Intrusion detection system using Online Sequence Extreme Learning Machine (OS-ELM) in advanced metering infrastructure of smart grid.

Advanced Metering Infrastructure (AMI) realizes a two-way communication of electricity data through by interconnecting with a computer network as the core component of the smart grid. Meanwhile, it brings many new security threats and the traditional intrusion detection method can't satisfy the security requirements of AMI. In this paper, an intrusion detection system based on Online Sequence Extreme Learning Machine (OS-ELM) is established, which is used to detecting the attack in AMI and carrying out the ...

Internet of Things (IoT) Based Design of a Secure and Lightweight Body Area Network (BAN) Healthcare System.

As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT). At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN). These personal wireless devices ...

Seasonal Difference in National School Lunch Program Participation and Its Impacts on Household Food Security.

The National School Lunch Program (NSLP) is one of the most important food assistance programs in the United States to ensure children's food security and healthy development. Previous studies have offered mixed results and challenges in estimating the effects of program participation. This study assesses NSLP's effect on household food security using data from the Survey of Income and Program Participation (SIPP). SIPP collects information on food security that covers four reference months, including both ...

Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information.

With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection based on Channel State Information (CSI). This detection algorithm can tell whether the static devices are Sybil attac...

The impact of ART initiation on household food security over time.

While evidence suggests that adequate nutrition contributes to the efficacy of ART, the potential causal impact of ART initiation on household food security has not been thoroughly examined. In this study, we present some of the first causal evidence of the impact of ART initiation on household food security. We employ a quasi-experimental design, regression discontinuity, over 5540 individuals from an ongoing population cohort study in KwaZulu-Natal, South Africa, by utilizing the CD4 count-based ART eligi...


Advertisement
Quick Search
Advertisement
Advertisement