Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4021
Enhancing misogyny detection in bilingual texts using explainable AI and multilingual fine-tuned transformers
Published 2024-11-01“…Abstract Gendered disinformation undermines women’s rights, democratic principles, and national security by worsening societal divisions through authoritarian regimes’ intentional weaponization of social media. …”
Get full text
Article -
4022
Measurement tools and indicators for assessing nurturing care for early childhood development: A scoping review.
Published 2022-01-01“…Nurturing care encompasses five components that are crucial for supporting early childhood development: good health, adequate nutrition, opportunities for early learning, responsive caregiving, and safety and security. While there has been increasing attention in global public health towards designing and delivering programs, services, and policies to promote nurturing care, measurement has focused more on the components of health and nutrition, with less attention to early learning, responsive caregiving, and safety and security. …”
Get full text
Article -
4023
Revealing the differences in bicycle theft and motorcycle theft: spatial patterns and contributing factors
Published 2025-02-01Get full text
Article -
4024
Named Entity Recognition Model Based on the Fusion of Word Vectors and Category Vectors
Published 2024-01-01Get full text
Article -
4025
-
4026
Detection the topics of Facebook posts using text mining with Latent Dirichlet Allocation (LDA) algorithm
Published 2025-01-01“…The significance of the research lies in its ability to discover themes within each post, which is crucial for analyzing user behavior and addressing security concerns. The use of relevant Facebook data enhances the real-world relevance of the results, facilitating targeted analysis based on the language patterns used by users in these posts and thus contributing to the success of security objectives. …”
Get full text
Article -
4027
Capacity Enhancement in 60 GHz Based D2D Networks by Relay Selection and Scheduling
Published 2015-01-01Get full text
Article -
4028
-
4029
The use of agencies by the Ministry of Internal Affairs of the Ukrainian SSR to control academic historical science in Soviet Ukraine (1953)
Published 2022-06-01“…Through the agent, who worked in this structure, state security officials tried to influence the personnel of the Institute and the main areas of its scientific activity. …”
Get full text
Article -
4030
-
4031
Interaction of the National Police of Ukraine and civil society institutions: concept and legal framework
Published 2023-09-01“…The introduction of martial law on the territory of Ukraine and the existence of real threats to national security have led to dramatic changes in the usual order of public administration, in particular in the activities of the security and defence sector, law enforcement agencies, local self-government, etc. …”
Get full text
Article -
4032
The formula for Peace as a result of a future without war in Ukraine
Published 2025-01-01“…Since 2014, attempts at peaceful resolution, including the Minsk Contact Group and the Normandy Format, failed to secure a ceasefire or reintegration of Donbas, nor did they avert russia’s full-scale invasion in February 2022. …”
Get full text
Article -
4033
Research on network risk assessment based on attack graph of expected benefits-rate
Published 2022-08-01“…As Internet applications and services become more and more extensive, the endless network attacks lead to great risks and challenges to the security of information systems.As a model-based network security risk analysis technology, attack graph is helpful to find the vulnerability between network nodes and the harm of being attacked.It has been proved to be an effective method to find and prevent network security risks.Attack graph is mainly divided into state-based attack graph and attribute-based attack graph.Due to the problem of state explosion in state-based attack graph, most researchers prefer the attribute-based attack graph for network risk assessment.In view of the existing researches on attribute-based attack graph, they excessively rely on the vulnerability of network nodes and the essential attributes of atomic attack.However, they ignore that rational attackers usually choose specific attack paths by maximizing attack benefits.Then, a network risk assessment framework and a quantification method of attack benefits-rate based on expected benefits-rate attack graph were proposed.The network risk assessment framework took the open vulnerability resource database, the new vulnerabilities found by the vulnerability mining system and the big data related to network attack and defense as the basic data source.The network risk assessment framework also took the open source big data platform as the analysis tool to mine and calculate the elements related to attack cost and attack benefit.Using the concepts of cost, benefit and benefit-rate in economics, the calculation model of expected benefit-rate of atomic attack was constructed.By constructing the attribute-based attack graph of the target network, the expected benefit-rate of atomic attack on the attack path was calculated, and the expected benefit-rate list of all possible attack paths was generated.Furthermore, taking the expected goal as the starting point, the search was carried out according to the specific optimization strategy (backtracking method, greedy algorithm, dynamic programming).And the complete attack path with the maximum benefit-rate was obtained, which provided the basis for network risk assessment.The simulation results show the effectiveness and rationality of the proposed expected benefit-rate attack graph network risk assessment method, which can provide support for discovering and preventing network security problems.…”
Get full text
Article -
4034
ESD-YOLOv8: An Efficient Solar Cell Fault Detection Model Based on YOLOv8
Published 2024-01-01Get full text
Article -
4035
Mathematical Modeling of Cyberattack Defense Mechanism Using Hybrid Transfer Learning With Snow Ablation Optimization Algorithm in Critical Infrastructures
Published 2025-01-01“…As digitalization upsurges, the requirement for cybersecurity measures becomes even more vital for numerous networks. To certify the security of critical infrastructures, numerous cyber security solutions must be taken together and the essential infrastructure must be developed. …”
Get full text
Article -
4036
Ex vivo detection of recreational consumed nitrous oxide in exhaled breath
Published 2025-01-01Get full text
Article -
4037
Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9
Published 2022-12-01“…The certificateless cryptosystem can solve the problems of certificate management and key escrow at the same time, but its security model always assumes that Type II adversary (named malicious KGC) will not launch public key replacement attacks.This security assumption has certain limitations in real-world applications.As an efficient identity-based cryptographic scheme, SM9 signature scheme adopts R-ate bilinear pairing which has good security and high computational efficiency.However, it requires KGC to generate and manage keys for users, so it has the problem of key escrow.In view of the above problems, a certificateless signature scheme against malicious KGC was constructed based on blockchain and SM9 signature algorithm.Based on the properties of decentralization and tamper-proof of blockchain, the proposed scheme used the smart contract to record part of the public key corresponding to the user’s secret value on the blockchain.Then, the verifier can revoke the smart contract to query the user’s public key during the signature verification stage.Therefore, the proposed scheme ensured the authenticity of the user’s public key.The user’s private key consisted of the partial private key generated by KGC and a secret randomly chosen by the user.The user required the partial private key generated by KGC to endorse his identity identifier when the user generates the private key for the first time.Subsequently, the private key can be independently updated by changing the secret and the corresponding partial public key.During this process, the identity remains unchanged, which provided a viable solution for key management in decentralized application scenarios.The blockchain relied on the consensus mechanism to ensure the consistency of the distributed data.Based on the traceability of the blockchain, the change log of user’s partial public key was stored in the blockchain, which can trace the source of malicious public key replacement attacks and thereby prevent malicious KGC from launching public key replacement attacks.According to the experimental simulation and security proof results, the total overhead of signature and verification of the proposed scheme is only 7.4ms.Compared with similar certificateless signature schemes, the proposed scheme can effectively resist public key replacement attacks and has higher computational efficiency.…”
Get full text
Article -
4038
Physical Inactivity and Food Insecurity Are Associated with Social Capital: A Large-Scale Population-Based Study in Tehran
Published 2022-01-01“…There are limited studies on food security, physical activity, and social capital in the Iranian population. …”
Get full text
Article -
4039
Prototype Sistem Keamanan Mobil dengan Menggunakan Quick Response Code Berbasis Android dan Arduino
Published 2019-05-01“…This research succeeded in making prototype car security system based on Android and Arduino. …”
Get full text
Article -
4040