Showing 3,821 - 3,840 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 3821
  2. 3822

    UNREST AND UNFILLED STOMACHS: UNRAVELLING THE LINKAGE BETWEEN ARMED CONFLICT AND FOOD INSECURITY IN NORTH CENTRAL REGION OF NIGERIA by COMFORT FATIMOH SHEIDU, IRORO S. IZU

    Published 2024-07-01
    “…Due to resource competition, political and ethnic tensions, historical grievances, and religious extremism, the region has seen protracted armed conflicts. Food security has declined as an outcome of disruptions in agriculture, infrastructure, and market systems. …”
    Get full text
    Article
  3. 3823

    Robust Schnorr-based subgroup multi-signature scheme by ZHANG Zhenqi, ZHU Qiuchi, WANG Zhiwei

    Published 2024-08-01
    “…The unpredictability of the subgroups effectively avoided the occurrence of Byzantine traitors, thus enhancing security and solving the problems of low reliability, security, and high computational complexity in consensus mechanisms. …”
    Get full text
    Article
  4. 3824
  5. 3825
  6. 3826
  7. 3827
  8. 3828

    Institutionalization of the UN Police Peacekeeping by S. A. Tishkov, D. K. Labin

    Published 2019-03-01
    “…Article studies the strategic frame, organizational and operational aspects of UN peacekeeping missions police components activities to ensure sustaining peace.It is noted that at present the UN Police actively participates in UN peace operations acting as an integrated solution of issues of peace and security. Consideration is also given to the growing importance of the UN Police to international peace and security and the increased attention given to policing by the Security Council and the Secretary General.The UN police now engage in United Nations peace operations across the entire peace and security spectrum, from conflict prevention to peacekeeping and peacebuilding. …”
    Get full text
    Article
  9. 3829
  10. 3830

    Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab World by Seokhee Lee, Aisha Abdu Hassan Mujammami, Kyounggon Kim

    Published 2025-01-01
    “…It emphasizes the critical role of social networks in contemporary cyber-attack landscapes, offering practical implications for cybersecurity practitioners, law enforcement agencies, and policymakers committed to securing the digital environment in Arab nations.…”
    Get full text
    Article
  11. 3831

    Explaining the Integrated Approach to Border Management and Control: A Case Study of Iranian Land Borders by reyhane salehabadi, syrus ahmadi, afshin motaghi

    Published 2023-12-01
    “…Given the different approaches to border control and management, it can be seen that this issue is still viewed as a security issue in developing countries, including Iran, and most of the approaches related to this are from a purely security perspective. …”
    Get full text
    Article
  12. 3832

    THE POLITICS OF INSECURITY REPORTAGE IN NORTHERN NIGERIA by ISA SA’IDU

    Published 2024-05-01
    “… Nigeria is faced with different challenges that nearly comatose the security architecture of the country. In the geopolitical North, it started as mere conflict over access to land largely involving herders and farmers. …”
    Get full text
    Article
  13. 3833
  14. 3834
  15. 3835

    Research on the Defense of Advanced Persistent Threats in Enterprise Network by Dongxin Liu, Guorong Liu, Shuai Wang, Jun Shen, Huamin Jin

    Published 2013-12-01
    “…The features of APT and the reason why traditional security defense architecture was failed were discussed. …”
    Get full text
    Article
  16. 3836

    Hybrid dung beetle optimization based dimensionality reduction with deep learning based cybersecurity solution on IoT environment by Amal K. Alkhalifa, Nuha Alruwais, Wahida Mansouri, Munya A. Arasi, Mohammed Alliheedi, Fouad Shoie Alallah, Alaa O. Khadidos, Abdulrhman Alshareef

    Published 2025-01-01
    “…Securing IoT devices involves implementing security measures and best practices to secure them from potential vulnerabilities and threats. …”
    Get full text
    Article
  17. 3837
  18. 3838

    Udlicitering af politiets opgaver i Danmark og Sverige by Mette Volquartzen

    Published 2020-04-01
    “…Abstract The growth in the private security industry alongside a persistent separation of policing from the state is a well-documented Western phenomenon. …”
    Get full text
    Article
  19. 3839

    Multi-server identity authentication scheme based on biometric and chaotic maps by Jianwu ZHANG, Zejin YAO, Zhendong WU

    Published 2017-02-01
    “…Password-based user remote authentication system has been widely used in recent years,the study found that a single password system is so vulnerable to dictionary analysis and brute force attack as well as other attacks that the security is not high.Biometric and password combination authentication method gradually added to the remote authentication system in order to improve the security level of authentication system.However,the existing authentication systems work in a single server environment,if extended to a multi-server environment,biometric templates and passwords will encounter single point breakthrough and cross-crack problem.In order to overcome the above problems,a multi-server key authentication scheme based on biometric and chaotic map was proposed.The scheme was based on smart cards,passwords and biometrics,which could significantly improve the security and the ability of anti-password guessing of multi-server authentication systems.…”
    Get full text
    Article
  20. 3840

    High capacity reversible hiding in encrypted domain based on cipher-feedback secret sharing by Minqing ZHANG, Chao JIANG, Fuqiang DI, Zongbao JIANG, Xiong ZHANG

    Published 2023-09-01
    “…To improve the security, robustness and embedding rate of reversible hiding in encrypted domain in the distributed environment, a multiple embedding algorithm based on cipher-feedback secret sharing was proposed.Firstly, the additional data were embedded into the polynomial coefficients redundancy generated in the process of secret image sharing.Secondly, the extra secrets were embedded by using the additive homomorphism of secret sharing.Experimental results demonstrate that a better security and robustness has been obtained by improving the diffusion characteristic of secret sharing using the feedback mechanism.In the (3,4) and (3,5) threshold, the embedding rates can reach 6.00 bit per pixel and 4.80 bit per pixel respectively.The proposed algorithm can not only maintain the strong security and separability, but also obtain a better embedding capacity.Meanwhile, the embedding rate of the scheme is not affected by the carrier image and is only related to the selection of algorithm parameters.…”
    Get full text
    Article