Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4181
Determinants of intention to use FinTechs services by accounting students: a mixed methods approach
Published 2023-01-01“…The study also included the variable “security” as an antecedent. Age and gender were controlled for this study. …”
Get full text
Article -
4182
-
4183
Early Cracking Risk Prediction Model of Concrete under the Action of Multifield Coupling
Published 2021-01-01Get full text
Article -
4184
Personal data privacy protection method based onvertical partitioning
Published 2024-10-01“…The results showed that the MLVP scheme was slightly slower in computation speed to ensure security against partial CSP collusion. However, it improved the query speed by 32.6% and 8.8% compared to the aforementioned schemes, respectively.…”
Get full text
Article -
4185
Wireless key generation system for internet of vehicles based on deep learning
Published 2024-02-01“…In recent years, the widespread application of internet of vehicles technology has garnered attention due to its complex nature and point-to-point communication characteristics.Critical and sensitive vehicle information is transmitted between different devices in internet of vehicles, necessitating the establishment of secure and reliable lightweight keys for encryption and decryption purposes in order to ensure communication security.Traditional key generation schemes have limitations in terms of flexibility and expandability within the vehicle network.A popular alternative is the physical layer key generation technology based on wireless channels, which offers lightweight characteristics and a theoretical basis of security in information theory.However, in the context of internet of vehicles, the movement speed of devices impacts the autocorrelation of generated keys, requiring improvements to traditional channel modeling methods.Additionally, the randomness and consistency of generated wireless keys are of higher importance in applications in internet of vehicles.This research focused on a key generation system based on the wireless physical layer, conducting channel modeling based on line-of-sight and multipath fading effects to reflect the impact of vehicle speed on autocorrelation.To enhance the randomness of key generation, a differential quantization method based on cumulative distribution function was proposed.Furthermore, an information reconciliation scheme based on neural network auto-encoder was introduced to achieve a dynamic balance between reliability and confidentiality.Compared to the implementation of Slepian-Wolf low-density parity-check codes, the proposed method reduces the bit disagreement rate by approximately 30%.…”
Get full text
Article -
4186
A Few-Shot Learning for Predicting Radar Receiver Interference Response Based on Distillation Meta-Learning
Published 2024-01-01Get full text
Article -
4187
Pathways to transform urban food systems: feminist action research from Cape Town and Nairobi
Published 2025-01-01“…This paper offers a feminist reflection on the findings of an ongoing study of health and wellbeing associated with urban food security in Nairobi and Cape Town. It offers five pathways through which a strengthened informal sector can contribute to transforming urban food systems: identifying stronger entry points for institutionalized collaboration between local governments and community-based organizations; enhancing government capacities to collaborate with grassroots actors; the potential, and challenges, of controlled-environment agriculture; rethinking and shifting the regulatory environment surrounding the informal economy; and responding to detailed new data on the state of food security in South African informal settlements. …”
Get full text
Article -
4188
Digital Health: The Cybersecurity for AI-Based Healthcare Communication
Published 2025-01-01“…Future healthcare hubs (future proactive devices), which will be deployed in various remote locations, utilize their own cybersecurity solutions to ensure secure AI-based healthcare communication services. …”
Get full text
Article -
4189
Trust evaluation model of social internet of things based on implicit social relationship
Published 2023-04-01“…The social internet of things (SIoT) is a new paradigm that combines social networks and the internet of things to enhance network scalability and navigability.However, with increased openness and mobility of intelligent objects, there are rising security risks related to information security and reliable service delivery, which poses a significant challenge to the SIoT.Trust is a critical factor in providing secure and reliable services.Therefore, a new trust assessment model was proposed from the perspective of social relationships.A trust transfer algorithm was proposed based on the explicit social relationships and potential features between nodes.The algorithm can tap and establish the implicit social relationships among nodes to solve the SIoT sparsity and cold start problem.Additionally, the social relations were fine-grained and divided to build a single-relationship sub-network.Multiple single-relationship sub-networks were fused to build a multiple-relationship composite network.Thus, the impact of multiple dynamically changing social relationships among nodes on trust evaluation can be effectively fused.The comprehensive trust assessment of intelligent objects was conducted based on three indicators: direct trust, indirect recommendation trust, and service satisfaction.The experimental results on real smart city datasets demonstrate the model’s robustness in non-sparse and sparse network scenarios.It can effectively evaluate trusted and untrusted objects in the network and improve the accuracy and convergence of trust evaluation.…”
Get full text
Article -
4190
-
4191
Systematic Literature Review of Machine Learning Models for Detecting DDoS Attacks in IoT Networks
Published 2024-12-01“…Recognizing deep learning's effectiveness sets the stage for refining IoT security protocols, and moreover, by identifying challenges, the research informs strategies to enhance IoT security, fostering a resilient framework.…”
Get full text
Article -
4192
Rural Households’ Vulnerability to Food Insecurity and Its Determinants in North Shewa Zone of Ethiopia
Published 2025-01-01“…Accordingly, based on the intensity of their vulnerability, households were grouped as chronic food insecure (43.72%), transient food insecure (12.57%), highly vulnerable-food secure (16.23%), and low vulnerable-food secure (27.49%). …”
Get full text
Article -
4193
Downlink Multiuser Hybrid Beamforming for MmWave Massive MIMO-NOMA System with Imperfect CSI
Published 2019-01-01Get full text
Article -
4194
A novel and highly efficient botnet detection algorithm based on network traffic analysis of smart systems
Published 2022-03-01Get full text
Article -
4195
-
4196
State-of-the-art survey of smart contract verification based on formal methods
Published 2022-08-01“…Smart contract represents an essential application scenario of blockchain technology.Smart contract technology improves programmability and scalability of blockchain, and has broad development prospects.However, a series of security incidents caused a great number of economic losses and weakened users’ confidence in the Ethereum platform.The security of smart contract has become a critical problem that restricts the further development of smart contract.Defects in smart contract code may cause serious consequences and cannot be modified once deployed, it is especially important to verify the correctness of smart contract in advance.In recent years, researchers have obtained many achievements in verification of smart contract, but there is a lack of systematic summary of these research results.Therefore, some basic principles of Ethereum were introduced, including the transaction, gas mechanism, storage and programming language.Eight common types of vulnerabilities in smart contract were summarized and their causes were explained.Some real security events were reviewed and some examples of vulnerability codes were presented.Then, the research work on automatic verification of smart contract based on symbolic execution, model checking and theorem proving was classified and summarized.Three open-source automated tools were selected, including Mythril, Slither and Oyente.And experiments were implemented to evaluate and compare the three tools from the aspects of efficiency, accuracy and the types of vulnerability can be detected.Furthermore, related review articles were surveyed, and the advantages of this paper compared with these works were summarized.The critical problems in the vulnerability detection technology of smart contract were also summarized and the direction of future research was proposed at last.…”
Get full text
Article -
4197
Anonymous trust management scheme of VANET based on attribute signature
Published 2023-04-01“…Trust management mechanisms can solve the authenticity assessment problem of messages and establish trust between communication entities in the VANET.However, current trust management schemes lack an effective privacy protection mechanism, leading to privacy concerns for vehicles when binding their identity with their trust level.Based on the anonymity of attribute-based signature, an anonymous trust management scheme was proposed for VANET.The trust level of the vehicle was maintained by the trusted authority.The trust level of vehicles and the current time were taken as the attribute identity set of the vehicle, so as to realize the binding of the anonymous vehicle identity with its trust level, which could provide the privacy protection of vehicles.In addition, the timely update of attribute signature private key could resist false reputation attack and the trust level of the vehicle could be verified anonymously while the attribute signature was verified.Furthermore, the pseudonym was used to hide the real identity of the vehicle, enabling only the trusted authority could parse the real identity of vehicles from the pseudonym to update their trust level, and providing legal and secure tracking of the malicious vehicle identity vehicle.Under the general group model, the attribute-based signature scheme is proven to satisfy the security of unforgerability.The security analysis further shows that the scheme protects the identity and location privacy of vehicles, enables only the trusted authority to legally track malicious vehicles, resists false reputation attacks, ensures communication integrity, and resists replay attacks.Performance analysis confirms that the proposed scheme has better computation and communication efficiency than existing schemes.…”
Get full text
Article -
4198
-
4199
Determine the psychosocial well-being of elderly residents living in old-age homes
Published 2024-12-01“…This study addresses the gap in the literature by comprehensively assessing factors like anxiety, feeling of security, and desire for longevity aiming to inform interventions for better support systems in old-age homes. …”
Get full text
Article -
4200
The Application of a Desktop NMR Spectrometer in Drug Analysis
Published 2018-01-01Get full text
Article