Showing 681 - 700 results of 5,943 for search '"security"', query time: 0.08s Refine Results
  1. 681
  2. 682

    Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions by Bilal Ahmad, Wang Jian, Zain Anwar Ali

    Published 2018-01-01
    “…Intrusion detection, an important entity towards network security, has the ability to observe network activity as well as detect intrusions/attacks. …”
    Get full text
    Article
  3. 683

    An Evaluation of the Security Ability of the Basic Endowment Insurance System for China’s Urban and Rural Residents by Bing Liu, Yuhong He, Zhi Liu

    Published 2022-01-01
    “…To evaluate security ability, a three-level evaluation index system with a total of 19 indicators is designed. …”
    Get full text
    Article
  4. 684
  5. 685

    The politics of gating (A response to Private Security and Public Space by Manzi and Smith-Bowers) by Rowland Atkinson

    Published 2008-05-01
    “…Critically then the risk is that ignoring the political and normative aspects of gating, as I believe Manzi and Smith-Bowers do, may lead to further and deeper socio-spatial segregation that itself excludes the voice of social groups least able to challenge or, indeed, reside in gated developments and the additional security that they appear to offer. …”
    Get full text
    Article
  6. 686

    A Safe and Secured Medical Textual Information Using an Improved LSB Image Steganography by Roseline Oluwaseun Ogundokun, Oluwakemi Christiana Abikoye

    Published 2021-01-01
    “…Intruders were found to be able to efficiently exploit securely transmitted messages from previous literature since the algorithms were not efficient enough leading to distortion of information. …”
    Get full text
    Article
  7. 687

    An Algorithm for Improving Email Security on the Android Operating System in the Industry 4.0 Era by Isaac Moses Kisembo, Gilbert Gilibrays Ocen, Ocident Bongomin, Andrew Egwar Alunyu, Ildephonse Nibikora, Davis Matovu, Felix Bwire

    Published 2021-01-01
    “…With several technologies shaping industry 4.0 epoch, notably, its cybersecurity entails the security of communication and network operations activities. …”
    Get full text
    Article
  8. 688

    A hybrid blockchain-based solution for secure sharing of electronic medical record data by Gang Han, Yan Ma, Zhongliang Zhang, Yuxin Wang

    Published 2025-01-01
    “…Patient privacy data security is a pivotal area of research within the burgeoning field of smart healthcare. …”
    Get full text
    Article
  9. 689

    Provably secure biometric and PUF-based authentication for roaming service in global mobility network by E. Haodudin Nurkifli

    Published 2025-02-01
    “…However, while GLOMONET offers numerous benefits, it also present security challenges that need to be addressed. To ensure secure mutual authentication and prevent attacks such as impersonation, physical attacks, and DoS attacks, GLOMONET must provide strong anonymity, address loss of synchronization issues, and incorporate unclonable devices as an essential security feature. …”
    Get full text
    Article
  10. 690

    Britain’s Indo-Pacific Security and Trade Policies: Continuity and Change Under the Labour Government by Samir PURI

    Published 2024-12-01
    “…The United Kingdom’s main motivation for its engagement in the Indo-Pacific is commercial, alongside its contributions to regional security. In July 2024, a Labour government replaced the Conservative government. …”
    Get full text
    Article
  11. 691
  12. 692

    A Hybrid and Secure Priority-Guaranteed MAC Protocol for Wireless Body Area Network by Sana Ullah, Muhammad Imran, Mohammed Alnuem

    Published 2014-02-01
    “…In addition, a set of security keys is used to prevent illegal access to the network. …”
    Get full text
    Article
  13. 693

    Breaking the Blockchain Trilemma: A Comprehensive Consensus Mechanism for Ensuring Security, Scalability, and Decentralization by Khandakar Md Shafin, Saha Reno

    Published 2024-01-01
    “…The ongoing challenge in the world of blockchain technology is finding a solution to the trilemma that involves balancing decentralization, security, and scalability. This paper introduces a pioneering blockchain architecture designed to transcend this trilemma, uniting advanced cryptographic methods, inventive security protocols, and dynamic decentralization mechanisms. …”
    Get full text
    Article
  14. 694

    2D Sin-Cos-Henon Map for Color Image Encryption with High Security by Zhiqiang Cheng, Wencheng Wang, Yuezhang Dai, Lun Li

    Published 2022-01-01
    “…In this paper, a high security color image encryption algorithm is proposed by 2D Sin-Cos-Hénon (2D-SCH) system. …”
    Get full text
    Article
  15. 695
  16. 696
  17. 697

    Problems, principles and prospects of international legal regulation of activities of private military and security companies by A. G. Volevodz

    Published 2010-06-01
    Subjects: “…проект конвенции о чвоп. keywords: private military and security companies…”
    Get full text
    Article
  18. 698

    Improving Oil Supply Security: Using a Risk Optimization Model to China and India by Ming Qi, Danyang Shi, Congcong Li, Jialu Wu, Pei Wang

    Published 2021-01-01
    “…Africa and North America will play a more important role in India’s oil supply security.…”
    Get full text
    Article
  19. 699
  20. 700