Showing 621 - 640 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 621
  2. 622
  3. 623
  4. 624

    Statistical Characteristics and Security Analysis over Multi-Cascade κ-μ Shadowed Channels by Xiaohong Wang, Ming Ren, Yiwei Fang, Xinji Tian, Yanyang Zeng

    Published 2022-01-01
    “…Moreover, we further utilize the two performance evaluation metrics including outage probability and intercept probability to investigate the impacts of cascade number and channel parameters on reliability and security. Finally, the theoretical results are consistent with the simulations, proving the correctness of the derivation. …”
    Get full text
    Article
  5. 625
  6. 626
  7. 627
  8. 628

    Delay-Tolerant, Low-Power Protocols for Large Security-Critical Wireless Sensor Networks by Claudio S. Malavenda, F. Menichelli, M. Olivieri

    Published 2012-01-01
    “…This paper reports the analysis, implementation, and experimental testing of a delay-tolerant and energy-aware protocol for a wireless sensor node, oriented to security applications. The solution proposed takes advantages from different domains considering as a guideline the low power consumption and facing the problems of seamless and lossy connectivity offered by the wireless medium along with very limited resources offered by a wireless network node. …”
    Get full text
    Article
  9. 629

    A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment by Sanchika Gupta, Padam Kumar, Ajith Abraham

    Published 2013-03-01
    “…This paper identifies vulnerabilities responsible for well-known network based attacks on cloud and does a critical analysis on the security measures available in cloud environment. This paper focuses on a nonconventional technique for securing cloud network from malicious insiders and outsiders with the use of network profiling. …”
    Get full text
    Article
  10. 630

    The politics of gating (A response to Private Security and Public Space by Manzi and Smith-Bowers) by Rowland Atkinson

    Published 2008-05-01
    “…Critically then the risk is that ignoring the political and normative aspects of gating, as I believe Manzi and Smith-Bowers do, may lead to further and deeper socio-spatial segregation that itself excludes the voice of social groups least able to challenge or, indeed, reside in gated developments and the additional security that they appear to offer. …”
    Get full text
    Article
  11. 631
  12. 632
  13. 633
  14. 634
  15. 635
  16. 636
  17. 637
  18. 638
  19. 639

    Water management for rice production: a key component of food security in East Africa by Denis Bwire, Hirotaka Saito, Roy C. Sidle, Moses Mugisha

    Published 2025-02-01
    “…Abstract Water is a valuable resource for rice production, which is an integral component of food security in East Africa (EA). Rice farming is expanding in the region, with up to 90% produced on smallholder farms using traditional flooding and rain-fed methods, vulnerable to climate change and variability. …”
    Get full text
    Article
  20. 640