Showing 501 - 520 results of 5,943 for search '"security"', query time: 0.08s Refine Results
  1. 501

    A distributed data secure transmission scheme in wireless sensor network by Wei Liang, Yin Huang, Jianbo Xu, Songyou Xie

    Published 2017-04-01
    “…Therefore, it is difficult to ensure security of broadcasting data transferred from a single wireless sensor node to base station. …”
    Get full text
    Article
  2. 502

    An Investigation into Information Security Managerial Practices in Selected Public Sector Organizations. by Ahimbisibwe, Benjamin K., Nabende, Peter, Musiimenta, Florence

    Published 2023
    “…The study aims to examine information security managerial practices in organisations. It was guided by three specific objectives: identification of information security practices critical to information assets management; establishment of implementation processes involved in the execution of structured information security governance; and evaluation of policies that influence information security best practices. …”
    Get full text
    Article
  3. 503
  4. 504

    Adaptive Security Solutions for NOMA Networks: The Role of DDPG and RIS-Equipped UAVs by Syed Zain Ul Abideen, Abdul Wahid, Mian Muhammad Kamal

    Published 2024-11-01
    Subjects: “…non-orthogonal multiple access, reconfigurable intelligent surface, unmanned aerial vehicles, deep reinforcement learning, deep deterministic policy gradient, physical layer security.…”
    Get full text
    Article
  5. 505

    Improving Network Security: An Intelligent IDS with RNN-LSTM and Grey Wolf Optimization by murtadha ali

    Published 2024-12-01
    “…The architecture of this RNN-LSTM with GWO IDS provides capable and responsive intrusion detection, training on previous data to be able to detect new threats. Made for network security by combining deep learning and optimization, tests reached 99.5% accurate. …”
    Get full text
    Article
  6. 506

    Secure UAV-Based System to Detect Small Boats Using Neural Networks by Moisés Lodeiro-Santiago, Pino Caballero-Gil, Ricardo Aguasca-Colomo, Cándido Caballero-Gil

    Published 2019-01-01
    “…Given the high sensitivity of the managed information, the proposed system includes cryptographic protocols to protect the security of communications.…”
    Get full text
    Article
  7. 507
  8. 508

    Advanced Approach to Information Security Management System Model for Industrial Control System by Sanghyun Park, Kyungho Lee

    Published 2014-01-01
    “…Therefore, a new information security management system based on confidentiality, integrity, and availability as well as safety is required for ICSs. …”
    Get full text
    Article
  9. 509

    Legal Regulation of Interaction of Security Service of Ukraine with Civil Society in Counteracting Terrorism by A. Yu. Helzhynskyi

    Published 2019-09-01
    “…The comparative legal method of the study analyzes the source base of national law concerning the interaction of the Security Service of Ukraine with civil society in fighting against terrorism. …”
    Get full text
    Article
  10. 510

    THE SECURITY ASPECT OF TURKEY-UNITED STATES RELATIONS: IN SEARCH FOR A NEW MODEL by I. A. Svistunova

    Published 2016-04-01
    “…Security cooperation has always been an important aspect of the relations between Turkey and the USA. …”
    Get full text
    Article
  11. 511
  12. 512

    Aukus (Australia-united kingdom-united states) threat to Indo-pacific security by Ismiyatun Ismiyatun, Ita Puji Lestari

    Published 2024-11-01
    “…Countries can change their defense budgets based on their assessment of security threats in the region and changes in the balance of power. …”
    Get full text
    Article
  13. 513
  14. 514

    Exploiting Dual-Output Programmable Blocks to Balance Secure Dual-Rail Logics by Laurent Sauvage, Maxime Nassar, Sylvain Guilley, Florent Flament, Jean-Luc Danger, Yves Mathieu

    Published 2010-01-01
    “…However, assessing the security level which can be achieved with them is an important issue, as it is directly related to the suitability to use commercial FPGA instead of proprietary custom FPGA for this kind of protection. …”
    Get full text
    Article
  15. 515
  16. 516
  17. 517
  18. 518

    Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks by HyungJun Kim

    Published 2012-11-01
    “…An overview of supervisory control and data acquisition (SCADA) systems is presented and relevant security concerns are addressed. To secure IP-based SCADA systems, it is vital to implement secure architectures which prevent access to the SCADA from corporate IT, in addition to excellent management practices in managing IP-based networks. …”
    Get full text
    Article
  19. 519

    A secure message-passing framework for inter-vehicular communication using blockchain by Muhammd Awais Hassan, Ume Habiba, Usman Ghani, Muhmmad Shoaib

    Published 2019-02-01
    “…To address the issues, we proposed a secure distributed message-passing framework that does not require a centralized server, and it rates the credibility of message source using blockchain technology. …”
    Get full text
    Article
  20. 520