Showing 4,361 - 4,380 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 4361
  2. 4362
  3. 4363
  4. 4364

    An Adaptive Intrusion Detection System for Evolving IoT Threats: An Autoencoder-FNN Fusion by J. Jasmine Shirley, M. Priya

    Published 2025-01-01
    “…The AE-FNN model’s high accuracy, robustness, and scalability position it as a valuable tool in securing interconnected IoT ecosystems, making it an important advancement in network security.…”
    Get full text
    Article
  5. 4365

    The End of Akıncı Corps in The Ottoman Empire by Mustafa Alkan

    Published 2013-12-01
    “…It has been known that the Akıncıs were in the Ottoman Empire an extention of the corps which provided the border security of the Turkish states. They were named in the Seljuki period as “margraves”. …”
    Get full text
    Article
  6. 4366

    U.S.-UK Voting Cohesion in the United Nations General Assembly: Important Votes (2001–2019) by A. O. Mamedova

    Published 2022-05-01
    “…Since most UNGA resolutions are not binding, countries have more room for maneuver compared to voting in the UN Security Council. Washington pays close attention to other countries’ voting behavior in the UNGA, especially when it comes to Israel-related issues. …”
    Get full text
    Article
  7. 4367

    Cyber Deception Against Battery Drain DoS Attacks in Wireless Sensor Networks Using Signaling Game by Ines Carole Kombou Sihomnou, Abderrahim Benslimane, Ahmed H. Anwar, Gabriel Deugoue, Charles A. Kamhoua

    Published 2025-01-01
    “…This approach allows us to identify energy-efficient scenarios and improve network security by distorting the attacker’s perception of the target. …”
    Get full text
    Article
  8. 4368
  9. 4369

    Refugee securitization and the challenges of formal integration: case of Somali refugees in Kenya and Ethiopia by Fred N. Ikanda, Abdirahman A. Muhumad, Jana Kuhnt

    Published 2025-01-01
    “…Policymakers and the media prominently feature the migration-security connection and depict refugees as threats to internal security, linking their presence to acts of terrorism and crime. …”
    Get full text
    Article
  10. 4370
  11. 4371

    Model of the malicious traffic classification based on hypergraph neural network by Wenbo ZHAO, Zitong MA, Zhe YANG

    Published 2023-10-01
    “…As the use and reliance on networks continue to grow, the prevalence of malicious network traffic poses a significant challenge in the field of network security.Cyber attackers constantly seek new ways to infiltrate systems, steal data, and disrupt network services.To address this ongoing threat, it is crucial to develop more effective intrusion detection systems that can promptly detect and counteract malicious network traffic, thereby minimizing the resulting losses.However, current methods for classifying malicious traffic have limitations, particularly in terms of excessive reliance on data feature selection.To improve the accuracy of malicious traffic classification, a novel malicious traffic classification model based on Hypergraph Neural Networks (HGNN) was proposed.The traffic data was represented as hypergraph structures and HGNN was utilized to capture the spatial features of the traffic.By considering the interrelations among traffic data, HGNN provided a more accurate representation of the characteristics of malicious traffic.Additionally, to handle the temporal features of traffic data, Recurrent Neural Networks (RNN) was introduced to further enhance the model’s classification performance.The extracted spatiotemporal features were then used for the classification of malicious traffic, aiding in the detection of potential threats within the network.Through a series of ablative experiments, the effectiveness of the HGNN+RNN method was verified.These experiments demonstrate the model’s ability to efficiently extract spatiotemporal features from traffic, resulting in improved classification performance for malicious traffic.The model achieved outstanding classification accuracy across three widely-used open-source datasets: NSL-KDD (94% accuracy), UNSW-NB15 (95.6% accuracy), and CIC-IDS-2017 (99.08% accuracy).These results underscore the potential significance of the malicious traffic classification model based on hypergraph neural networks in enhancing network security and its capacity to better address the evolving landscape of network threats within the domain of network security.…”
    Get full text
    Article
  12. 4372

    A Compact Multi-Identity Fully Homomorphic Encryption Scheme Without Fresh Ciphertexts by Ziwei Wang, Ruwei Huang, Xiyi Wei

    Published 2025-01-01
    “…The lattice-based multi-identity fully homomorphic encryption scheme combines the quantum security of lattice cryptography with the advantage of identity-based encryption. …”
    Get full text
    Article
  13. 4373

    Impact of telemedicine mobile units on health outcomes, healthcare system resilience, and disaster response in flood-affected areas: a case study of Sehat Kahani by Hamna Khuld

    Published 2024-06-01
    “…We identified themes related to resource analysis, accessibility, security, scalability, training, evaluation, collaboration, and sustainability. …”
    Get full text
    Article
  14. 4374

    High speed national secret SM4 optical fiber communication system scheme based on FPGA by Peiyu HUANG, Jiabo SONG, Yangfan JIA

    Published 2023-12-01
    “…With the increasing use of optical fiber communication technology in the Industrial Internet of Things, cryptographic algorithms play a crucial role in ensuring the security of data transmission in embedded device environments.The SM4 packet cipher algorithm, developed independently in our country, is widely applied to wireless LAN and Internet of Things data encryption.However, the software-based encryption and decryption processes are relatively slow, which hampers their application in scenarios requiring high real-time performance, especially for embedded devices.To address this issue, a high-performance and secure optical fiber communication system was designed based on the FPGA platform and the SM4 algorithm.The FPGA was used to implement the MAC layer interface for SM4 algorithm encryption and decryption, as well as data transmission.Besides, an optimization scheme for the hardware implementation architecture of the SM4 algorithm was proposed.The critical path was shortened by employing a pipeline method, thereby improving the system clock frequency.Additionally, parallel processing of S-box transformation was accelerated to enable efficient data replacement.To reduce data reading delays, a dual-cache processing method was combined to facilitate easier processing of cache data and significantly reduce packet loss rates.This scheme greatly enhanced system data throughput.Experimental results demonstrate that compared to similar designs, the throughput of the SM4 algorithm encryption and decryption module in this scheme reaches up to 25.6 Gbit/s, with minimal differences in resource consumption.Due to limitations imposed by the 10-gigabit SFP+ optical module, the throughput of the entire optical fiber communication system reaches 9.4 Gbit/s.For 128-bit data, the average encryption speed is 0.47 μs/bit and the average decryption speed is 0.28 μs/bit, which can be applied to a variety of secure communication scenarios in the internet of things.…”
    Get full text
    Article
  15. 4375

    THE IMPACT OF FISCAL POLICY TOOLS ON AGRICULTURAL PRODUCTION: TÜRKIYE AS A MODEL by Ahmed Albajjari, Ahmed Abdul-Majeed, Mohammed Albana

    Published 2024-12-01
    “…Because of its ability to achieve food security and support the level of economic performance in both developing and developed economies. …”
    Get full text
    Article
  16. 4376

    Economic impact of fetal wastage and common diseases, along with their incidence rates and seasonal variations, at an abattoir in FCT, Nigeria. by Ibrahim Dauda Dauda, Abdulhakeem Binhambali, Abdurrahman Hassan Jibril, Zainab Oyiza Idris, Farhan Rhidor Akorede

    Published 2025-01-01
    “…The notable economic losses from condemned organs also underscore the necessity of implementing pregnancy tests for female animals before slaughter to protect food security and support the nation's economy. These findings highlight the essential role of abattoirs in improving food security, detecting zoonotic diseases, and bolstering public health and economic stability in low-income countries.…”
    Get full text
    Article
  17. 4377
  18. 4378

    Survey on blockchain privacy protection techniques in cryptography by Feng LIU, Jie YANG, Jiayin QI

    Published 2022-08-01
    “…In recent years, the issue of data privacy has attracted increased attention, and how to achieve effective privacy protection in blockchain is a new research hotspot.In view of the current research status and development trend of blockchain in privacy protection, the privacy protection methods of blockchain in transaction address,prophecy machine and smart contract were explained, and the privacy strategies of blockchain in the protection of basic elements were summarized.Based on high-level literature at home and abroad, two types of blockchain cryptographic protection methods and usage scenarios were analyzed, including special cryptographic primitives and post-quantum cryptography.The advantages and disadvantages of seven cryptographic techniques applicable to current blockchain privacy protection were also reviewed, including attribute-based encryption, special data signature, homomorphic encryption, secure multi-party computation, zero-knowledge proofs, and lattice ciphers.It was concluded that the privacy protection of blockchain applications cannot be achieved without cryptographic technology.Meanwhile, the blockchain privacy protection technologies were analyzed in terms of both basic element protection and cryptographic protection.It was concluded that it was difficult to effectively solve the privacy problem only from the application and contract layers of the blockchain, and various cryptographic technologies should be used to complement each other according to different needs and application scenarios.In addition, according to the current development status of blockchain privacy cryptography, the narrative was developed from blockchain basic element protection and cryptography-based protection.From the perspectives of both endogenous basic element security and exogenous cryptographic privacy security, basic element privacy protection should be studied first, followed by an in-depth analysis of cryptographic protection techniques for blockchain privacy.The strengths and weaknesses and the potential value of the privacy handling aspects of the corresponding safeguards should be measured in terms of the development of technology in conjunction with practical applications, while considering the timeliness of the technology.Finally, an outlook on the future direction of blockchain privacy protection technologies was provided, indicating the issues that need to be addressed in focus.…”
    Get full text
    Article
  19. 4379

    Food Insecurity and Coping Strategies in War-Affected Urban Settings of Tigray, Ethiopia by Hafte Gebreselassie Gebrihet, Yibrah Hagos Gebresilassie, Mekonen Aregai Gebreselassie

    Published 2025-01-01
    “…This study aimed to examine the effects of prolonged armed conflict on food security among urban households in Tigray, Ethiopia, and to examine their coping mechanisms. …”
    Get full text
    Article
  20. 4380

    Dual medical image watermarking using SRU-enhanced network and EICC chaotic map by Fei Yan, Zeqian Wang, Kaoru Hirota

    Published 2024-12-01
    “…Accordingly, enhancing the integrity and security of medical images has gained significant prominence as a crucial research trajectory. …”
    Get full text
    Article