Showing 701 - 720 results of 5,943 for search '"security"', query time: 0.08s Refine Results
  1. 701
  2. 702

    Secure Event-Triggered Mechanism for Networked Control Systems under Injection Cyber-Attacks by Xiao Cai, Jian Kang, Kaibo Shi

    Published 2022-01-01
    “…This study focuses on the secure stability issue of networked control systems (NCSs) under injection cyber-attacks (ICAs), which have important research value of applications for network security. …”
    Get full text
    Article
  3. 703
  4. 704

    Evaluation, Energy Optimization, and Spectrum Analysis of an Artificial Noise Technique to Improve CWSN Security by Javier Blesa, Alvaro Araujo, Elena Romero, Octavio Nieto-Taladriz

    Published 2013-06-01
    “…This paper presents the security evaluation, energy consumption optimization, and spectrum scarcity analysis of artificial noise techniques to increase physical-layer security in Cognitive Wireless Sensor Networks (CWSNs). …”
    Get full text
    Article
  5. 705

    Security protection method based on mimic defense and Paillier encryption for smart IoT terminals by GU Tiansheng, ZENG Fukang, SHAO Sisi, NIE Yijun, JI Zongkai, ZHENG Yulu, SHI Yuchen, LIU Shangdong, JI Yimu

    Published 2024-12-01
    “…In particular, the endogenous security and secure transmission issues faced by IoT edge-area smart terminals, due to uncertain threats like unknown vulnerabilities and backdoors, are of considerable concern in the realm of smart IoT. …”
    Get full text
    Article
  6. 706

    Chaotic Stream Cipher-Based Secure Data Communications over Intelligent Transportation Network by Wei Zhang, Shanyu Tang, Liping Zhang, Zhao Ma, Jun Song

    Published 2015-01-01
    “…To address the above security problems, we proposed a chaotic stream cipher-based cryptographic scheme to realise secure data communications over wireless sensor network (WSN), which is a part of ITS. …”
    Get full text
    Article
  7. 707

    Food Acquisition Coping Strategies Vary Based on Food Security Among University Students by Emily Sklar, Gwen M Chodur, Leslie Kemp, Deborah S Fetter, Rachel E Scherr

    Published 2025-01-01
    “…Results: Despite targeted recruitment efforts, 76% of participants were classified as food secure by the United States Department of Agriculture (USDA) Adult Food Security Survey Module (AFSSM). …”
    Get full text
    Article
  8. 708

    SviaB: Secure and verifiable multi‐instance iris remote authentication using blockchain by Mahesh Kumar Morampudi, Munaga V. N. K. Prasad, Surya Narayana Raju Undi

    Published 2022-01-01
    “…In a malicious server setting, the server may return an arbitrary result to save computational resources, resulting in a false accept/reject. To address this, secure and verifiable multi‐instance iris authentication using blockchain (SviaB) is proposed. …”
    Get full text
    Article
  9. 709
  10. 710
  11. 711
  12. 712
  13. 713
  14. 714
  15. 715

    Strategic Health Diplomacy: An Indonesia’s Approach in Securing COVID-19 Booster Vaccine Supplies by Deasy Silvya Sari, Mas Halimah, Akim Akim, Renata Maximillian, Fakhri Sabiq Muawal, Nathanael Jusac Lie

    Published 2024-06-01
    “…This study provides an in-depth analysis of Indonesia’s health diplomacy strategy in securing booster vaccines for COVID-19, a critical component in mitigating the impact of the pandemic. …”
    Get full text
    Article
  16. 716
  17. 717

    Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology by Xiaokun Zheng

    Published 2022-01-01
    “…In order to detect the computer network security technology vulnerabilities due to various factors, the normal operation of the computer network must be ensured, the user’s confidential information must be protected, and it is proposed that the analysis and research on security vulnerability detection must be strengthened. …”
    Get full text
    Article
  18. 718
  19. 719
  20. 720