Showing 781 - 800 results of 5,943 for search '"security"', query time: 0.08s Refine Results
  1. 781
  2. 782
  3. 783

    Science and opinion in decision making: A case study of the food security collapse in Sri Lanka by Akila Wijerathna‐Yapa, Robert J. Henry, Matt Dunn, Christine A. Beveridge

    Published 2023-09-01
    “…Abstract Making decisions related to security, whether at the community, national, or regional level, is a highly intricate task. …”
    Get full text
    Article
  4. 784

    A Review about Internet of Things (IoT) integration with Cloud Computing with a Limelight on Security by Umm e Kulsoom, Syeda Faiza Nasim, Asma Qaiser, Sidra Aziz, Syeda Alishba Fatima

    Published 2024-01-01
    Subjects: “…Cloud Computing, IoT, IoT Security, Cyber Security, Cloud Attacks, Cloud Attacks Prevention…”
    Get full text
    Article
  5. 785
  6. 786

    Angle and Context Free Grammar Based Precarious Node Detection and Secure Data Transmission in MANETs by Anitha Veerasamy, Srinivasa Rao Madane, K. Sivakumar, Audithan Sivaraman

    Published 2016-01-01
    “…However, it produces additional overhead while securing the network. Hence, a Location and Trust-based secure communication scheme (L&TS) is proposed to overcome this limitation. …”
    Get full text
    Article
  7. 787

    Audit Analysis of Abnormal Behavior of Social Security Fund Based on Adaptive Spectral Clustering Algorithm by Yan Wu, Yonghong Chen, Wenhao Ling

    Published 2021-01-01
    “…Abnormal behavior detection of social security funds is a method to analyze large-scale data and find abnormal behavior. …”
    Get full text
    Article
  8. 788
  9. 789
  10. 790
  11. 791

    A Comparative Survey of Centralised and Decentralised Identity Management Systems: Analysing Scalability, Security, and Feasibility by Aviral Goel, Yogachandran Rahulamathavan

    Published 2024-12-01
    “…Traditional identity management (IdM) solutions based on centralised protocols, such as Lightweight Directory Access Protocol (LDAP) and Security Assertion Markup Language (SAML), are where a central authority manages all the processes. …”
    Get full text
    Article
  12. 792
  13. 793
  14. 794
  15. 795

    Research on cloud dynamic public key information security based on elliptic curve and primitive Pythagoras by Zhenlong Man, Jianmeng Liu, Fan Zhang, Xiangfu Meng

    Published 2025-02-01
    “…In order to solve the problems of key redundancy, transmission and storage security and the difficulty of realizing the one-time-secret mode in image encryption algorithm, this paper proposes a cloud dynamic public key information security scheme based on elliptic curve and primitive Pythagoras. …”
    Get full text
    Article
  16. 796
  17. 797

    Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication by Banghua Wu, Shah Nazir, Neelam Mukhtar

    Published 2020-01-01
    “…Security has become one of the important factors for any network communication and transmission of data packets. …”
    Get full text
    Article
  18. 798

    Oral Health Status and Anxiety Level Amongst the Borderline Security Force Personnel and Their Family Members by Deepali Agarwal, Bharathi Purohit, Upendra Singh Bhadauria, Sneha Malhotra, Manali Deb Barma, Harsh Priya

    Published 2025-02-01
    “…The primary role of border security personnel is to safeguard borders against illegal trans-border activities during peacetime and provide military support during wartime. …”
    Get full text
    Article
  19. 799
  20. 800