Showing 581 - 600 results of 5,943 for search '"security"', query time: 0.09s Refine Results
  1. 581
  2. 582

    Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device by Hyun-Woo Kim, Jun-Ho Kim, Jong Hyuk Park, Young-Sik Jeong

    Published 2014-01-01
    “…In this paper, we propose the secure locking screen using time pattern (SLSTP) focusing on improved security and convenience for users to support human-centric multimedia device completely. …”
    Get full text
    Article
  3. 583

    Optimal defense strategy based on the mean field game model for cyber security by Li Miao, Lina Wang, Shuai Li, Haitao Xu, Xianwei Zhou

    Published 2019-02-01
    “…With the evolution of research on defense strategies in cyber security, the choice of an optimal strategy has become a key problem in current studies. …”
    Get full text
    Article
  4. 584

    AI-based model for securing cognitive IoT devices in advance communication systems by Akshat Gaurav, Varsha Arya, Kwok Tai Chui, Brij B. Gupta

    Published 2025-12-01
    “…These security challenges are exacerbated by IoT devices’ limited computational resources and storage capacities, rendering traditional security protocols ineffective. …”
    Get full text
    Article
  5. 585

    Designing an internet of things laboratory to improve student understanding of secure IoT systems by A. Ravishankar Rao, Angela Elias-Medina

    Published 2024-01-01
    “…The instructional lab material has been uploaded to the web portal https://clark.center designated by the National Security Agency for dissemination. Our approach, design, and experimental validation methodology will be useful for educators, researchers, students, and organizations interested in re-skilling their workforce.…”
    Get full text
    Article
  6. 586
  7. 587
  8. 588
  9. 589
  10. 590
  11. 591
  12. 592
  13. 593
  14. 594
  15. 595
  16. 596

    CYBER SECURITY ANALYSIS OF IOT DEVICES TRANSMITTING DATA IN THE THINGSPEAK PLATFORM CLOUD by DRAGOS-ALEXANDRU ANDRIOAIA

    Published 2022-10-01
    Subjects: “…IoT security, sniffing IoT attacks, ThingSpeak, IoT, IoT attacks…”
    Get full text
    Article
  17. 597

    A Secure and Robust Machine Learning Model for Intrusion Detection in Internet of Vehicles by Pradeep Kumar Tiwari, Shiv Prakash, Animesh Tripathi, Tiansheng Yang, Rajkumar Singh Rathore, Manish Aggarwal, Narendra Kumar Shukla

    Published 2025-01-01
    “…Although these technologies provide unparalleled connectivity and communication capabilities, they also introduce new security challenges, particularly in terms of Intrusion Detection. …”
    Get full text
    Article
  18. 598

    Eucalyptus-based livelihoods: enhancing household food security and resilience in Northwest Ethiopia by Fasika Belay, Fasika Belay, Messay Mulugeta, Teferee Makonnen

    Published 2025-02-01
    “…Farmers in northwest Ethiopia have been transforming their livelihood strategies, however, the impact of this transformation on food security status and resilience is hardly investigated. …”
    Get full text
    Article
  19. 599

    Monitoring Brazilian Food Security Based on Emergy Concepts: A Proposed Approach by Rafael Araujo Nacimento, Mario Duarte Canever, Luiz Carlos Terra dos Santos, Cecília Almeida, Feni Agostinho, Biagio Fernando Giannetti

    Published 2024-12-01
    “…This study enhances the discussion on food security by examining trade equity between food consumers and the supply chain from an emergy perspective. …”
    Get full text
    Article
  20. 600