Showing 4,021 - 4,040 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 4021

    Enhancing misogyny detection in bilingual texts using explainable AI and multilingual fine-tuned transformers by Ehtesham Hashmi, Sule Yildirim Yayilgan, Muhammad Mudassar Yamin, Mohib Ullah

    Published 2024-11-01
    “…Abstract Gendered disinformation undermines women’s rights, democratic principles, and national security by worsening societal divisions through authoritarian regimes’ intentional weaponization of social media. …”
    Get full text
    Article
  2. 4022

    Measurement tools and indicators for assessing nurturing care for early childhood development: A scoping review. by Joshua Jeong, Lilia Bliznashka, Eileen Sullivan, Elizabeth Hentschel, Youngkwang Jeon, Kathleen L Strong, Bernadette Daelmans

    Published 2022-01-01
    “…Nurturing care encompasses five components that are crucial for supporting early childhood development: good health, adequate nutrition, opportunities for early learning, responsive caregiving, and safety and security. While there has been increasing attention in global public health towards designing and delivering programs, services, and policies to promote nurturing care, measurement has focused more on the components of health and nutrition, with less attention to early learning, responsive caregiving, and safety and security. …”
    Get full text
    Article
  3. 4023
  4. 4024
  5. 4025
  6. 4026

    Detection the topics of Facebook posts using text mining with Latent Dirichlet Allocation (LDA) algorithm by Shahlaa Mashhadani

    Published 2025-01-01
    “…The significance of the research lies in its ability to discover themes within each post, which is crucial for analyzing user behavior and addressing security concerns. The use of relevant Facebook data enhances the real-world relevance of the results, facilitating targeted analysis based on the language patterns used by users in these posts and thus contributing to the success of security objectives. …”
    Get full text
    Article
  7. 4027
  8. 4028
  9. 4029

    The use of agencies by the Ministry of Internal Affairs of the Ukrainian SSR to control academic historical science in Soviet Ukraine (1953) by O. N. Yarmysh, V. A. Grechenko

    Published 2022-06-01
    “…Through the agent, who worked in this structure, state security officials tried to influence the personnel of the Institute and the main areas of its scientific activity. …”
    Get full text
    Article
  10. 4030
  11. 4031

    Interaction of the National Police of Ukraine and civil society institutions: concept and legal framework by V. V. Pylyp

    Published 2023-09-01
    “…The introduction of martial law on the territory of Ukraine and the existence of real threats to national security have led to dramatic changes in the usual order of public administration, in particular in the activities of the security and defence sector, law enforcement agencies, local self-government, etc. …”
    Get full text
    Article
  12. 4032

    The formula for Peace as a result of a future without war in Ukraine by M. Pyvovar

    Published 2025-01-01
    “…Since 2014, attempts at peaceful resolution, including the Minsk Contact Group and the Normandy Format, failed to secure a ceasefire or reintegration of Donbas, nor did they avert russia’s full-scale invasion in February 2022. …”
    Get full text
    Article
  13. 4033

    Research on network risk assessment based on attack graph of expected benefits-rate by Wenfu LIU, Jianmin PANG, Xin ZHOU, Nan LI, Feng YUE

    Published 2022-08-01
    “…As Internet applications and services become more and more extensive, the endless network attacks lead to great risks and challenges to the security of information systems.As a model-based network security risk analysis technology, attack graph is helpful to find the vulnerability between network nodes and the harm of being attacked.It has been proved to be an effective method to find and prevent network security risks.Attack graph is mainly divided into state-based attack graph and attribute-based attack graph.Due to the problem of state explosion in state-based attack graph, most researchers prefer the attribute-based attack graph for network risk assessment.In view of the existing researches on attribute-based attack graph, they excessively rely on the vulnerability of network nodes and the essential attributes of atomic attack.However, they ignore that rational attackers usually choose specific attack paths by maximizing attack benefits.Then, a network risk assessment framework and a quantification method of attack benefits-rate based on expected benefits-rate attack graph were proposed.The network risk assessment framework took the open vulnerability resource database, the new vulnerabilities found by the vulnerability mining system and the big data related to network attack and defense as the basic data source.The network risk assessment framework also took the open source big data platform as the analysis tool to mine and calculate the elements related to attack cost and attack benefit.Using the concepts of cost, benefit and benefit-rate in economics, the calculation model of expected benefit-rate of atomic attack was constructed.By constructing the attribute-based attack graph of the target network, the expected benefit-rate of atomic attack on the attack path was calculated, and the expected benefit-rate list of all possible attack paths was generated.Furthermore, taking the expected goal as the starting point, the search was carried out according to the specific optimization strategy (backtracking method, greedy algorithm, dynamic programming).And the complete attack path with the maximum benefit-rate was obtained, which provided the basis for network risk assessment.The simulation results show the effectiveness and rationality of the proposed expected benefit-rate attack graph network risk assessment method, which can provide support for discovering and preventing network security problems.…”
    Get full text
    Article
  14. 4034
  15. 4035

    Mathematical Modeling of Cyberattack Defense Mechanism Using Hybrid Transfer Learning With Snow Ablation Optimization Algorithm in Critical Infrastructures by Mohamad Khairi Ishak

    Published 2025-01-01
    “…As digitalization upsurges, the requirement for cybersecurity measures becomes even more vital for numerous networks. To certify the security of critical infrastructures, numerous cyber security solutions must be taken together and the essential infrastructure must be developed. …”
    Get full text
    Article
  16. 4036
  17. 4037

    Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9 by Fei TANG, Ning GAN, Xianggui YANG, Jinyang WANG

    Published 2022-12-01
    “…The certificateless cryptosystem can solve the problems of certificate management and key escrow at the same time, but its security model always assumes that Type II adversary (named malicious KGC) will not launch public key replacement attacks.This security assumption has certain limitations in real-world applications.As an efficient identity-based cryptographic scheme, SM9 signature scheme adopts R-ate bilinear pairing which has good security and high computational efficiency.However, it requires KGC to generate and manage keys for users, so it has the problem of key escrow.In view of the above problems, a certificateless signature scheme against malicious KGC was constructed based on blockchain and SM9 signature algorithm.Based on the properties of decentralization and tamper-proof of blockchain, the proposed scheme used the smart contract to record part of the public key corresponding to the user’s secret value on the blockchain.Then, the verifier can revoke the smart contract to query the user’s public key during the signature verification stage.Therefore, the proposed scheme ensured the authenticity of the user’s public key.The user’s private key consisted of the partial private key generated by KGC and a secret randomly chosen by the user.The user required the partial private key generated by KGC to endorse his identity identifier when the user generates the private key for the first time.Subsequently, the private key can be independently updated by changing the secret and the corresponding partial public key.During this process, the identity remains unchanged, which provided a viable solution for key management in decentralized application scenarios.The blockchain relied on the consensus mechanism to ensure the consistency of the distributed data.Based on the traceability of the blockchain, the change log of user’s partial public key was stored in the blockchain, which can trace the source of malicious public key replacement attacks and thereby prevent malicious KGC from launching public key replacement attacks.According to the experimental simulation and security proof results, the total overhead of signature and verification of the proposed scheme is only 7.4ms.Compared with similar certificateless signature schemes, the proposed scheme can effectively resist public key replacement attacks and has higher computational efficiency.…”
    Get full text
    Article
  18. 4038
  19. 4039

    Prototype Sistem Keamanan Mobil dengan Menggunakan Quick Response Code Berbasis Android dan Arduino by Kuat Indartono, Abdul Jahir

    Published 2019-05-01
    “…This research succeeded in making prototype car security system based on Android and Arduino. …”
    Get full text
    Article
  20. 4040