Showing 721 - 740 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 721
  2. 722

    Exploring the Integration of Blockchain and Distributed DevOps for Secure, Transparent, and Traceable Software Development by Junaid Nasir Qureshi, Muhammad Shoaib Farooq, Usman Ali, Adel Khelifi, Zabihullah Atal

    Published 2025-01-01
    “…However, it does suffer from a lack of security, transparency, and traceability, which can result in project delays, a lack of trust between stakeholders, and even project failure. …”
    Get full text
    Article
  3. 723
  4. 724

    Analyzing Rail Traffic Diversion Based on Machine Learning Technique considering Transportation Security by Jing Luo, Dai Zhou, Wenjun Ma, Guohua Zhao

    Published 2022-01-01
    “…Based on a stated preference survey, we comprehensively analyze the travel psychology of residents and the advantages and disadvantages of rail transit and conventional buses, travel time, travel cost, travel security, and vehicle comfort and investigate the relationship between the relevant influencing factors and the transition probability from rail transit to buses. …”
    Get full text
    Article
  5. 725

    Implementation of lightweight intrusion detection model for security of smart green house and vertical farm by Jun-Ho Huh

    Published 2018-04-01
    “…Development and implementation of smart green houses and vertical farms are two major solutions for the expected crisis, but as other ICT-based systems, their security problems must be dealt with. Nevertheless, current network forensics is still unable to fully monitor and analyze computer network traffic to gather the evidences of malicious attacks or intrusions. …”
    Get full text
    Article
  6. 726
  7. 727

    Charging wireless sensor network security technology based on encryption algorithms and dynamic model by Yuanming Li, Wei Guo, Xuejun Meng, Wen Xia

    Published 2020-02-01
    “…Wireless networks cover all aspects of life, along with it, network security issues have gradually emerged. In recent years, network security vulnerabilities have been exposed continuously, from WiFi to Bluetooth, people gradually realize the security of wireless networks. …”
    Get full text
    Article
  8. 728
  9. 729

    Examining the drivers of ecological footprint components: Is pursuing food security environmentally costly for Nigeria? by Hephzibah Onyeje Obekpa, Andrew Adewale Alola, Adejo Moses Adejo, Chukwuemeka Echebiri

    Published 2025-01-01
    “…The result of the investigation provides insight and measures for improving food security without necessarily increasing ecological pressure. …”
    Get full text
    Article
  10. 730
  11. 731

    Food Security in the Wake of Perennial Crop Farming. Paradoxes Underlying Commercial Agriculture in Kigezi. by Chama, Julius

    Published 2023
    “…This study establishes that the tea sector has not in any way affected food security in the region of Kigezi and has instead improved house hold incomes, been a source of employment and boosted revenue for households. …”
    Get full text
    Article
  12. 732
  13. 733
  14. 734
  15. 735
  16. 736

    Video surveillance legislation in the EU and Slovenia: privacy rights, security needs, and data protection challenges by Benjamin Lesjak, Mateja Savić

    Published 2023-11-01
    “…It distinguishes itself by offering a practical view in ensuring data protection compliance and security technologies regarding video surveillance.…”
    Get full text
    Article
  17. 737

    A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform by Srinivas Koppu, V. Madhu Viswanatham

    Published 2017-01-01
    “…An enhanced secure image chaotic cryptosystem has been proposed based on hybrid CMT-Lanczos algorithm. …”
    Get full text
    Article
  18. 738
  19. 739
  20. 740