Advertisement

Topics

PubMed Journals Articles About "Tenable Network Security" RSS

04:51 EDT 27th April 2018 | BioPortfolio

Tenable Network Security PubMed articles on BioPortfolio. Our PubMed references draw on over 21 million records from the medical literature. Here you can see the latest Tenable Network Security articles that have been published worldwide.

More Information about "Tenable Network Security" on BioPortfolio

We have published hundreds of Tenable Network Security news stories on BioPortfolio along with dozens of Tenable Network Security Clinical Trials and PubMed Articles about Tenable Network Security for you to read. In addition to the medical data, news and clinical trials, BioPortfolio also has a large collection of Tenable Network Security Companies in our database. You can also find out about relevant Tenable Network Security Drugs and Medications on this site too.

Showing "Tenable Network Security" PubMed Articles 1–25 of 4,600+

A decoy chain deployment method based on SDN and NFV against penetration attack.

Penetration attacks are one of the most serious network security threats. However, existing network defense technologies do not have the ability to entirely block the penetration behavior of intruders. Therefore, the network needs additional defenses. In this paper, a decoy chain deployment (DCD) method based on SDN+NFV is proposed to address this problem. This method considers about the security status of networks, and deploys decoy chains with the resource constraints. DCD changes the attack surface of th...


Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse enginee...

ADVANCED SURVEILLANCE OF ENVIROMENTAL RADIATION IN AUTOMATIC NETWORKS.

The objective of this study is the verification of the operation of a radiation monitoring network conformed by several sensors. The malfunction of a surveillance network has security and economic consequences, which derive from its maintenance and could be avoided with an early detection. The proposed method is based on a kind of multivariate distance, and the verification for the methodology has been tested at CIEMAT's local radiological early warning network.


Utilising a multi-item questionnaire to assess household food security in Australia.

Currently, two food sufficiency questions are utilised as a proxy measure of national food security status in Australia. These questions do not capture all dimensions of food security and have been attributed with underreporting of the problem. The purpose of this study was to investigate food security using the short form of the US Household Food Security Survey Module (HFSSM) within an Australian context; and explore the relationship between food security status and multiple socio-demographic variables.

Attachment security priming: a systematic review.

Attachment security priming has been used to shed light on the cognitive processes related to attachment internal working models as well as the cognitive substrates of people's attachment-related affect and behavior. Security primes activate a sense of attachment security by making mental representations in one's memory more accessible and salient. In the current paper, we report on a qualitative synthesis of 20 studies published in the last two years to determine the effects of security priming. We found t...

Detection of total hip arthroplasties at airport security checkpoints - how do updated security measures affect patients?

There have been historical reports on the experiences of patients with total hip arthroplasty (THA) passing through standard metal detectors at airports. The purpose of this study was to analyse those who had recently passed through airport security and the incidence of: (i) triggering of the alarm; (ii) extra security searches; and (iii) perceived inconvenience.

From performance to performativity: The legitimization of US security contracting and its consequences.

Discussions about the legitimacy of private security companies (PSCs) in multilateral military interventions abound. This article looks at how the United States has sought to legitimize the outsourcing of security services to PSCs through performance-based contracting and performance assessments. Both mechanisms aim to demonstrate the effective provision of publicly desirable outcomes. However, the immaterial and socially constructed nature of security presents major problems for performance assessments in ...

A two-stage flow-based intrusion detection model for next-generation networks.

The next-generation network provides state-of-the-art access-independent services over converged mobile and fixed networks. Security in the converged network environment is a major challenge. Traditional packet and protocol-based intrusion detection techniques cannot be used in next-generation networks due to slow throughput, low accuracy and their inability to inspect encrypted payload. An alternative solution for protection of next-generation networks is to use network flow records for detection of malici...

Medical cyber-physical systems: A survey.

Medical cyber-physical systems (MCPS) are healthcare critical integration of a network of medical devices. These systems are progressively used in hospitals to achieve a continuous high-quality healthcare. The MCPS design faces numerous challenges, including inoperability, security/privacy, and high assurance in the system software. In the current work, the infrastructure of the cyber-physical systems (CPS) are reviewed and discussed. This article enriched the researches of the networked Medical Device (MD)...

A semi-symmetric image encryption scheme based on the function projective synchronization of two hyperchaotic systems.

Both symmetric and asymmetric color image encryption have advantages and disadvantages. In order to combine their advantages and try to overcome their disadvantages, chaos synchronization is used to avoid the key transmission for the proposed semi-symmetric image encryption scheme. Our scheme is a hybrid chaotic encryption algorithm, and it consists of a scrambling stage and a diffusion stage. The control law and the update rule of function projective synchronization between the 3-cell quantum cellular neur...

On the security of consumer wearable devices in the Internet of Things.

Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connec...

Food Security and its Related Factors in the Rural Households of Bam City in Iran: A Logistic Regression Model Approach.

Awareness of the food security status of rural population and its influencing factors is essential for policy makers, public health institutions and the development of rural programs. This descriptive cross-sectional study was conducted in 2017 on 384 rural households in Bam city. The data was collected via the 6-item USDA questionnaire. Logistic regression was used to determine the relationship between social, economic and health factors with food security. The results indicate that 35.67% of households ha...

Information technology as a tool for the Italian Institute of Social Security (INPS) in the management of social security and civil disability: Pro and cons.

We examine, from a medical-legal perspective, the pro and cons of the information technology procedures that the Italian Institute of Social Security (INPS) has implemented to manage the provision of social disability assistance, meaning that separate from the payment of pension contributions, being welfare, anchored to an administrative requirement by way of the compulsory payment of a minimum social security contribution.

A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks.

The Internet of things (IoT) is composed of billions of sensing devices that are subject to threats stemming from increasing reliance on communications technologies. A Trust-Based Secure Routing (TBSR) scheme using the traceback approach is proposed to improve the security of data routing and maximize the use of available energy in Energy-Harvesting Wireless Sensor Networks (EHWSNs). The main contributions of a TBSR are (a) the source nodes send data and notification to sinks through disjoint paths, separat...

The Role of Healthcare Technology Management in Facilitating Medical Device Cybersecurity.

This article discusses the role of healthcare technology management (HTM) in medical device cybersecurity and outlines concepts that are applicable to HTM professionals at a healthcare delivery organization or at an integrated delivery network, regardless of size. It provides direction for HTM professionals who are unfamiliar with the security aspects of managing healthcare technologies but are familiar with standards from The Joint Commission (TJC). It provides a useful set of recommendations, including re...

BPC: from security advances to the risk of social security reform.

This paper analyzes the proposed changes in the Continuous Cash Benefit (BPC) discussed within the Social Security Reform, both with regard to the Federal Government's original proposal in 2016 and the proposal by the rapporteur's project submitted to Congress in 2017. The proposed changes focus on two aspects: increased minimum age of access and unlinking the BPC amount from the minimum wage amount. The document discusses the justifications for the BPC reform, regarding both disincentives to social securit...

The new subversive geranium: some notes on the management of additional troubles in maximum security prisons.

In this paper, we revisit King and McDermott's 1990 article on the social construction of 'control problem' prisoners and their management in high security prisons, in the light of our recent research on the location and building of trust in contemporary high security prisons. We examine how religious and race identities are now deeply implicated in the construction of risk, and we describe the procedures for and some of the consequences of managing the new risks of radicalization and extremist violence in ...

An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mec...

Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.

The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the conf...

What is the Best Surgeon's Knot ? Evaluation of the Security of the Different Laparoscopic Knot Combinations.

To investigate the security of various knot combinations in laparoscopic surgery.

Intrusion detection system using Online Sequence Extreme Learning Machine (OS-ELM) in advanced metering infrastructure of smart grid.

Advanced Metering Infrastructure (AMI) realizes a two-way communication of electricity data through by interconnecting with a computer network as the core component of the smart grid. Meanwhile, it brings many new security threats and the traditional intrusion detection method can't satisfy the security requirements of AMI. In this paper, an intrusion detection system based on Online Sequence Extreme Learning Machine (OS-ELM) is established, which is used to detecting the attack in AMI and carrying out the ...

Internet of Things (IoT) Based Design of a Secure and Lightweight Body Area Network (BAN) Healthcare System.

As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT). At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN). These personal wireless devices ...

Capacity Development through the US President's Malaria Initiative-Supported Antimalarial Resistance Monitoring in Africa Network.

Antimalarial drug resistance is an evolving global health security threat to malaria control. Early detection of Plasmodium falciparum resistance through therapeutic efficacy studies and associated genetic analyses may facilitate timely implementation of intervention strategies. The US President's Malaria Initiative-supported Antimalarial Resistance Monitoring in Africa Network has assisted numerous laboratories in partner countries in acquiring the knowledge and capability to independently monitor for mole...

Seasonal Difference in National School Lunch Program Participation and Its Impacts on Household Food Security.

The National School Lunch Program (NSLP) is one of the most important food assistance programs in the United States to ensure children's food security and healthy development. Previous studies have offered mixed results and challenges in estimating the effects of program participation. This study assesses NSLP's effect on household food security using data from the Survey of Income and Program Participation (SIPP). SIPP collects information on food security that covers four reference months, including both ...

Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information.

With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection based on Channel State Information (CSI). This detection algorithm can tell whether the static devices are Sybil attac...


Advertisement
Quick Search
Advertisement
Advertisement