期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
The reforms in the field of technical regulation and standardization in Uzbekistan
1
作者 Umid Shodjalilov 《China Standardization》 2025年第5期44-44,共1页
Uzbekistan Institute of Standards(UIS),founded in 1969,is the national standardization body of Uzbekistan.There are over 32,000 national standards in Uzbekistan.Last year,UIS revised the working regulations of all tec... Uzbekistan Institute of Standards(UIS),founded in 1969,is the national standardization body of Uzbekistan.There are over 32,000 national standards in Uzbekistan.Last year,UIS revised the working regulations of all technical committees,which were established in accordance with the organizational structure of ISO.At present,UIS has standardization training courses covering 54 directions,and more than 1,700 experts have received relevant training.UIS ranks the 95th in terms of the Quality Infrastructure for Sustainable Development(QI4SD)and 80th in terms of the Global Quality Infrastructure Index(GQII).It is a member of ISO and an associate member of IEC.In the UIS,40 experts have participated in the activities of various ISO technical committees,and 251 experts have participated in the discussion of IEC projects as observer members. 展开更多
关键词 quality infrastructure technical committees national standards ISO Uzbekistan Institute Standards standardization technical regulation revised working regulations
原文传递
Review of Techniques for Integrating Security in Software Development Lifecycle
2
作者 Hassan Saeed Imran Shafi +3 位作者 Jamil Ahmad Adnan Ahmed Khan Tahir Khurshaid Imran Ashraf 《Computers, Materials & Continua》 SCIE EI 2025年第1期139-172,共34页
Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniq... Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniques coming up rapidly.The purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle(SDLC)by analyzing the articles published in the last two decades and to propose a way forward.This review follows Kitchenham’s review protocol.The review has been divided into three main stages including planning,execution,and analysis.From the selected 100 articles,it becomes evident that need of a collaborative approach is necessary for addressing critical software security risks(CSSRs)through effective risk management/estimation techniques.Quantifying risks using a numeric scale enables a comprehensive understanding of their severity,facilitating focused resource allocation and mitigation efforts.Through a comprehensive understanding of potential vulnerabilities and proactive mitigation efforts facilitated by protection poker,organizations can prioritize resources effectively to ensure the successful outcome of projects and initiatives in today’s dynamic threat landscape.The review reveals that threat analysis and security testing are needed to develop automated tools for the future.Accurate estimation of effort required to prioritize potential security risks is a big challenge in software security.The accuracy of effort estimation can be further improved by exploring new techniques,particularly those involving deep learning.It is also imperative to validate these effort estimation methods to ensure all potential security threats are addressed.Another challenge is selecting the right model for each specific security threat.To achieve a comprehensive evaluation,researchers should use well-known benchmark checklists. 展开更多
关键词 Software development lifecycle systematic literature review critical software security risks national institute of standards and technology DevSecOps open web application security project McGraw’s touch points
在线阅读 下载PDF
WASIC empowers high-quality development of global automobile industry
3
《China Standardization》 2025年第6期11-11,共1页
Hosted by China Automotive Technology and Research Center Co.,Ltd.(CATARC),the World Automobile Standards and Innovation Conference(WASIC)was jointly held by China Automotive Standardization Research Institute and CAT... Hosted by China Automotive Technology and Research Center Co.,Ltd.(CATARC),the World Automobile Standards and Innovation Conference(WASIC)was jointly held by China Automotive Standardization Research Institute and CATARC Technology Co.,Ltd.on October 27-29 in Shenzhen City,South China’s Guangdong Province. 展开更多
关键词 shenzhen city guangdong province catarc technology co ltd china automotive standardization research institute china automotive technology research center co ltd global automobile industry world automobile standards innovation conference high quality development
原文传递
China strives for carbon neutrality through energy labels
4
《China Standardization》 2025年第4期8-8,共1页
The China National Institute of Standardization(CNIS)held the Academic Meeting on 20th Anniversary of China Energy Label in Beijing on June 27.The event took place during the 35th National Energy Conservation Publicit... The China National Institute of Standardization(CNIS)held the Academic Meeting on 20th Anniversary of China Energy Label in Beijing on June 27.The event took place during the 35th National Energy Conservation Publicity Week,which ran from June 23 to 29. 展开更多
关键词 carbon neutrality China National Institute standardization china energy label China energy label energy labels national energy conservation publicity week
原文传递
IECC-SAIN:Innovative ECC-Based Approach for Secure Authentication in IoT Networks
5
作者 Younes Lahraoui Jihane Jebrane +2 位作者 Youssef Amal Saiida Lazaar Cheng-Chi Lee 《Computer Modeling in Engineering & Sciences》 2025年第7期615-641,共27页
Due to their resource constraints,Internet of Things(IoT)devices require authentication mechanisms that are both secure and efficient.Elliptic curve cryptography(ECC)meets these needs by providing strong security with... Due to their resource constraints,Internet of Things(IoT)devices require authentication mechanisms that are both secure and efficient.Elliptic curve cryptography(ECC)meets these needs by providing strong security with shorter key lengths,which significantly reduces the computational overhead required for authentication algorithms.This paper introduces a novel ECC-based IoT authentication system utilizing our previously proposed efficient mapping and reverse mapping operations on elliptic curves over prime fields.By reducing reliance on costly point multiplication,the proposed algorithm significantly improves execution time,storage requirements,and communication cost across varying security levels.The proposed authentication protocol demonstrates superior performance when benchmarked against relevant ECC-based schemes,achieving reductions of up to 35.83%in communication overhead,62.51%in device-side storage consumption,and 71.96%in computational cost.The security robustness of the scheme is substantiated through formal analysis using the Automated Validation of Internet Security Protocols and Applications(AVISPA)tool and Burrows-Abadir-Needham(BAN)logic,complemented by a comprehensive informal analysis that confirms its resilience against various attack models,including impersonation,replay,and man-in-the-middle attacks.Empirical evaluation under simulated conditions demonstrates notable gains in efficiency and security.While these results indicate the protocol’s strong potential for scalable IoT deployments,further validation on real-world embedded platforms is required to confirm its applicability and robustness at scale. 展开更多
关键词 Industrial IoT Elliptic Curve Cryptography(ECC) National Institute of Standards and Technology(NIST)curves mapping AVISPA BAN logic computational efficiency security scalable IoT deployments
在线阅读 下载PDF
China National Institute of Standardization(CNIS)
6
《China Standardization》 2011年第1期31-31,共1页
Affiliated with the General Administration of Quality Supervision and Inspection and Quarantine of the People's Republic of China (AQSIQ), China National Institute of Standardization (CNIS) is a nonprofit nationa... Affiliated with the General Administration of Quality Supervision and Inspection and Quarantine of the People's Republic of China (AQSIQ), China National Institute of Standardization (CNIS) is a nonprofit national research body engaging in standardization research. The main responsibilities of CNIS are to conduct all-round, strategic, and comprehensive research of standardization during the development process of economy and society, 展开更多
关键词 BODY CNIS China National Institute of standardization
原文传递
Polyurethane Coating and Lining on Ductile Iron Pipes
7
作者 Sabarna Roy 《Journal of Environmental Science and Engineering(B)》 2020年第5期182-188,共7页
In this technical paper,we will discuss polyurethane linings and coatings to ductile iron pipe for transporting corrosive and abrasive fluids in a sub soil,that is extremely corrosive in nature.The capabilities of ECL... In this technical paper,we will discuss polyurethane linings and coatings to ductile iron pipe for transporting corrosive and abrasive fluids in a sub soil,that is extremely corrosive in nature.The capabilities of ECL(Electrosteel Castings Limited)in this regard will be discussed. 展开更多
关键词 Polyurethane LINING coating ECL ISI(Indian Standards Institution) test certificates performance tests PROVISION specification
在线阅读 下载PDF
A Fast Pseudorandom Number Generator with BLAKE Hash Function
8
作者 WANG Houzhen ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2010年第5期393-397,共5页
This paper presents a fast pseudorandom generation algorithm,which is based on the BLAKE hash function and can pass the random test of the NIST(National Institute of Standards and Technology)Statistical Test Suite.Thr... This paper presents a fast pseudorandom generation algorithm,which is based on the BLAKE hash function and can pass the random test of the NIST(National Institute of Standards and Technology)Statistical Test Suite.Through theoretical analysis and experimental imitation,our new algorithm is proven to be more secure and efficient than G-SHA1.Simultaneously,we introduce and discuss the BLAKE in detail.Its security shows that can be utilized to generate pseudorandom bit sequences,which the experimental results show the BLAKE hash function has excellent pseudorandomness.Therefore,we believe the BLAKE is one of the most potential candidate algorithms of SHA-3 program. 展开更多
关键词 CRYPTOGRAPHY pseudorandom number generator hash function National Institute of Standards and Technology Statistical Test Suite
原文传递
Forensics: Collection of Sound Digital Evidence
9
作者 Richard Kabanda Harihar Thapa Luis Rivera 《Journal of Information Security》 2023年第4期454-463,共10页
This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introd... This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introduction to digital forensics. This discussion will thereafter result in identifying and categorizing the different types of digital forensics evidence and a clear procedure for how to collect forensically sound digital evidence. This paper will further discuss the creation of awareness and promote the idea that competent practice of computer forensics collection is important for admissibility in court. 展开更多
关键词 Electronic Discovery Reference Model National Institute of Standards and Technology (NIST) Message-Digest Algorithm Secure Hash Algorithm Forensically Sound Digital Evidence
在线阅读 下载PDF
Certification Institutions Expected to Update and Transfer Information on Present Standards
10
作者 Zeng Jiansan He Yanfeng 《China Standardization》 2008年第1期24-25,共2页
Standards are the basis for production enterprises to organize production, ex-factory inspection, trade (delivery) and technical exchanges, product certification, quality arbitration and supervision. It is important f... Standards are the basis for production enterprises to organize production, ex-factory inspection, trade (delivery) and technical exchanges, product certification, quality arbitration and supervision. It is important for certification institutions to explore methods for updating and transferring present standards, to accelerate the transfer of standard information and ensure present standards are implemented in a timely manner. 展开更多
关键词 In Certification Institutions Expected to Update and Transfer Information on Present Standards
原文传递
The History, Trend, Types, and Mitigation of Distributed Denial of Service Attacks
11
作者 Richard Kabanda Bertrand Byera +1 位作者 Henrietta Emeka Khaja Taiyab Mohiuddin 《Journal of Information Security》 2023年第4期464-471,共8页
Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global infor... Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat. 展开更多
关键词 DDoS (Distributed Denial of Service Attacks) and DoS (Denial of Service Attacks) DAC (DDoS Attack Coefficient) Flood SIEM (Security Information and Event Management) CISA (Cybersecurity and Infrastructure Security Agency) NIST (National Institute of Standards and Technology) XDR (Extended Detection and Response) ACK-SYN (Synchronize Acknowledge Packet) ICMP (Internet Control Message Protocol) Cyberwarfare
在线阅读 下载PDF
Automotive Standardization Research Institute of CATARC---Focus on Standards and Technical Regulations
12
《中国汽车(英文版)》 2001年第5期22-23,共2页
Automotive Standardization Research Institute ’is, specialized in the standardization and technical regulation research for automobiles and motorcycles. Its main activities include: Nationwide Auto Standardization Te... Automotive Standardization Research Institute ’is, specialized in the standardization and technical regulation research for automobiles and motorcycles. Its main activities include: Nationwide Auto Standardization Technology Comprehensive 展开更多
关键词 Automotive standardization Research Institute of CATARC Focus on Standards and Technical Regulations OEM
原文传递
Organic heterojunction synaptic device with ultra high recognition rate for neuromorphic computing 被引量:1
13
作者 Xuemeng Hu Jialin Meng +5 位作者 Tianyang Feng Tianyu Wang Hao Zhu Qingqing Sun David Wei Zhang Lin Chen 《Nano Research》 SCIE EI CSCD 2024年第6期5614-5620,共7页
Traditional computing structures are blocked by the von Neumann bottleneck,and neuromorphic computing devices inspired by the human brain which integrate storage and computation have received more and more attention.H... Traditional computing structures are blocked by the von Neumann bottleneck,and neuromorphic computing devices inspired by the human brain which integrate storage and computation have received more and more attention.Here,a flexible organic device with 2,7-dioctyl[1]benzothieno[3,2-b][1]benzothiophene(C8-BTBT)and 2,9-didecyldinaphtho[2,3-b:2′,3′-f]thieno[3,2-b]thiophene(C10-DNTT)heterostructural channel having excellent synaptic behaviors was fabricated on muscovite(MICA)substrate,which has a memory window greater than 20 V.This device shows better electrical characteristics than organic field effect transistors with single organic semiconductor channel.Furthermore,the device simulates organism synaptic behaviors successfully,such as paired-pulse facilitation(PPF),long-term potentiation/depression(LTP/LTD)process,and transition from short-term memory(STM)to long-term memory(LTM)by optical and electrical modulations.Importantly,the neuromorphic computing function was verified using the Modified National Institute of Standards and Technology(MNIST)pattern recognition,with a recognition rate nearly 100%without noise.This research proposes a flexible organic heterojunction with the ultra-high recognition rate in MNIST pattern recognition and provides the possibility for future flexible wearable neuromorphic computing devices. 展开更多
关键词 organic heterojunction neuromorphic computing synapse behaviors optical modulation Modified National Institute of Standards and Technology(MNIST)pattern recognition
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部