-
201
Perspective Solutions in the Field of Personnel Motivation in the Digital Economy
Published 2019-07-01“…They are little loyal to traditional organizations, which creates problems in securing and motivating staff.The subject of the article is the positioning of technical solutions in the field of material motivation of personnel in the era of digital business transformation. …”
Get full text
Article -
202
Progress and trends on machine learning in proteomics during 1997-2024: a bibliometric analysis
Published 2025-08-01“…Future efforts should focus on building interpretable models, enhancing cross-disciplinary collaboration, and ensuring secure, standardized data use to advance precision medicine.Systematic review registrationhttps://doi.org/10.17605/OSF.IO/F4WUG.…”
Get full text
Article -
203
Reversible Image Watermarking Using Modified Quadratic Difference Expansion and Hybrid Optimization Technique
Published 2025-06-01“…This article introduces a Modified Quadratic Difference Expansion (MQDE) and fractal encryption-based reversible watermarking for securing the copyrights of images. First, fractal encryption is applied to watermarks using Tromino's L-shaped theorem to improve security. …”
Get full text
Article -
204
Methodical approach to quantitative assessment of the risks of the implementation of threats unauthorized access to an information resource automated systems of internal affairs bo...
Published 2022-11-01“…A methodical approach to the quantitative assessment of the risks of the implementation of UA threats to the information resource of the ATS AS is proposed, which makes it possible to assess the level of security of service information.Conclusion. The proposed methodological approach to quantitative assessment of the risks of the implementation of UA threats to the information resource of the ATS AS provides a visual representation in monetary terms of the objects of assessment (damage, costs). …”
Get full text
Article -
205
A sparse and invisible targeted backdoor attack in federated learning
Published 2025-07-01Get full text
Article -
206
Privacy-Preserving Detection of Tampered Radio-Frequency Transmissions Utilizing Federated Learning in LoRa Networks
Published 2024-11-01“…LoRa networks, widely adopted for low-power, long-range communication in IoT applications, face critical security concerns as radio-frequency transmissions are increasingly vulnerable to tampering. …”
Get full text
Article -
207
-
208
PROFESSIONAL AND PEDAGOGICAL COMPETENCE OF EDUCATIONAL AND METHODOLOGICAL CENTERS TEACHERS IN THE SPHERE OF CIVIL DEFENSE: STRUCTURE AND CONTENT
Published 2023-07-01“…The aim of the article is to identify the structure and the content of professional and pedagogical competence of educational and methodological centers teachers in the sphere of civil defense based on the analysis of the higher educational standards in the specialty 011 «Education, pedagogical science» for the second (master’s) level of higher education and in the specialty 263 «Civil Security» for the second (master’s) level of higher education and expert survey. …”
Get full text
Article -
209
Automated System for OEE Management in the Industrial Sector
Published 2025-07-01“…The platform also supports real-time and historical OEE data visualization, with customizable views for specific days and shifts. …”
Get full text
Article -
210
Attention-Enhanced CNN for High-Performance Deepfake Detection: A Multi-Dataset Study
Published 2025-01-01“…Deepfakes, which emerge from advanced deep learning techniques, present complex ethical and security challenges across media and communication landscapes. …”
Get full text
Article -
211
-
212
Research on heterogeneous resource modeling and encapsulation technology of industrial cyber range
Published 2024-01-01Get full text
Article -
213
An analysis of the physical contexts of crime in urban spaces and the provision of preventive design solutions, case study: Enghelab Street in Tehran
Published 2025-09-01“…One of the most effective approaches to enhancing urban security is crime prevention through environmental design (CPTED), which focuses on the role of urban design in reducing criminal behavior. …”
Get full text
Article -
214
Regulating foreign direct investment to achieve technological sovereignty in the European Union
Published 2025-03-01“…The political agenda of the EU aims to diversify partners, but their range is limited by national security considerations, which is unlikely to contribute to actual diversification. …”
Get full text
Article -
215
AGASI: A Generative Adversarial Network-Based Approach to Strengthening Adversarial Image Steganography
Published 2025-03-01Get full text
Article -
216
Mobile applications for skin cancer detection are vulnerable to physical camera-based adversarial attacks
Published 2025-05-01“…Our study demonstrates the importance of security evaluation in deploying such applications in clinical settings.…”
Get full text
Article -
217
-
218
-
219
-
220
IoT-Based Smart Lock with Real-Time Person Detection Using YOLOv5 and Mobile App Integration
Published 2025-07-01“…The system combines three authentication factors: a keypad code, visual detection of authorized individuals, and mobile app verification. …”
Get full text
Article