Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4461
Survey of Artificial Intelligence Model Marketplace
Published 2025-01-01“…It further explores the AI model life-cycle, highlighting pricing, trading, tracking, security, and compliance challenges. This detailed analysis is intended for an audience with a foundational understanding of AI systems, marketplaces, and their operational ecosystems. …”
Get full text
Article -
4462
Data-Driven Technologies for Energy Optimization in Smart Buildings: A Scoping Review
Published 2025-01-01“…Despite the benefits, challenges such as high initial costs, technical complexities, security risks, and user acceptance hinder their widespread adoption. …”
Get full text
Article -
4463
Zero-Trust Access Control Mechanism Based on Blockchain and Inner-Product Encryption in the Internet of Things in a 6G Environment
Published 2025-01-01“…This mechanism ensures data security while maintaining system efficiency in environments with large-scale data interactions.…”
Get full text
Article -
4464
Using the WHO building blocks to examine cross-border public health surveillance in MENA
Published 2025-02-01“…In conclusion, the WHO HSS Building Block Framework provides a comprehensive approach to assessing and improving cross-border public health surveillance and enhancing health security and equity in MENA. Strengthening cross-border surveillance systems may help MENA countries meet IHR requirements, achieve greater health security, and advance health equity among all types of mobile populations. …”
Get full text
Article -
4465
Mass Fragmentation Characteristics of t-Boc Substituted Drug Precursors
Published 2025-01-01Get full text
Article -
4466
Implementasi Algoritme Morus V2 untuk Pengamanan Data Pada Perangkat Bluetooth Low Energy
Published 2022-12-01“…Data transmission will be insecure without a data security process. Cryptography is one of the options for securing data. …”
Get full text
Article -
4467
-
4468
Dual-stack host discovery method based on SSDP and DNS-SD protocol
Published 2023-02-01“…With the exhaustion of the IPv4 addresses, the promotion and deployment of IPv6 has been accelerating.Dual-stack technology allows devices to enable both IPv4 and IPv6 protocols, which means that users are facing more security risks.Although the existing work can realize the identification and measurement of some dual-stack servers, the following problems still exist.Dual-stack host identification requires deep protocol identification of host services, but this method consumes too much scanning resources.Besides, network service providers may provide consistent services on distributed hosts, making it difficult to guarantee the accuracy of dual-stack host identification through service fingerprints.To solve these problems, the LAN service discovery protocol was used to bind host services to IP addresses, and a dual-stack host discovery method based on SSDP and DNS-SD protocols was proposed.In IPv4 network environment, the target host was induced to actively send a request to the constructed IPv6 server through SSDP protocol, and then the IPv6 address was extracted from the server’s log.Or the service list of the target host and its corresponding AAAA record was enumerated through the DNS-SD protocol and the IPv6 address of the target host was obtained, in order to realize the discovery of the dual stack address pairs.With this method, IPv6 addresses was obtained directly from the IPv4 host, which ensured the accuracy of the discovered dual-stack host.At the same time, only request packets for specific protocols were needed during the discovery process, which greatly saved scanning resources.Based on this method, the SSDP hosts and DNS-SD hosts accidentally exposed to the global IPv4 network were measured.A total number of 158k unique IPv6 addresses were collected, of which 55k were dual-stack host address pairs with globally reachable IPv6 addresses.Unlike existing work that focused on dual-stack servers, this method mainly targeted end-users and client devices, and built a unique set of active IPv6 devices and dual-stack host address pairs that have not been explored so far.Through the analysis of the obtained IPv6 address addressing type, it shows that IPv6 address is mainly generated in a random manner, which greatly reduces the possibility of IPv6 hosts being discovered by scanning.In particular, by measuring the ports and services of dual-stack hosts, we found that the security policy differences of dual-stack hosts on different protocol stacks.Especially, IPv6 protocol stack exposes more high-risk services, expanding the attack surface of hosts.The research results also show that the infeasibility of IPv6 address space traversal scanning mitigates the security risks of IPv6, but incorrect network configuration greatly increases the possibility of these high-risk IPv6 hosts being discovered and users should revisit IPv6 security strategy on dual-stack hosts.…”
Get full text
Article -
4469
Réprimer par le droit : L’intervention de la Brigade nationale de police judicaire dans les procès du Hirak El-Rif
Published 2023-12-01“…Accused of "undermining state security", the arrested activists, considered to be the movement's leaders, were sentenced to between 5 and 20 years in prison. …”
Get full text
Article -
4470
Vegetation growth improvement Inadequately represents the ecological restoration of the Populus euphratica forests in Xinjiang, China
Published 2025-01-01“…The Populus euphratica Oliv (P. euphratica) is a representative tree species in the riparian forests of arid regions, which acts as a barrier to prevent desert invasion and provides various ecosystem services for biodiversity conservation and ecological security. However, the community of P. euphratica has experienced significant shrinkage and ecological degradation over the past centuries due to natural and anthropogenic factors, particularly in the arid regions of Xinjiang, China. …”
Get full text
Article -
4471
Epidemiological survey on tick borne diseases of pet dogs in korla, northwestern china
Published 2024-12-01Get full text
Article -
4472
Perceptions of climatic variability among millet farmers: insights from tribal communities in the Kolli Hills, Tamil Nadu, South India
Published 2025-01-01“…Climate change has a diversified impact on the accessibility to resources and maintaining food security for the growing population. In this era, climate-resilient crops such as millet have greater importance and impact on the food security of the nation. …”
Get full text
Article -
4473
Learning deep forest for face anti-spoofing: An alternative to the neural network against adversarial attacks
Published 2024-10-01“…Face anti-spoofing (FAS) is significant for the security of face recognition systems. neural networks (NNs), including convolutional neural network (CNN) and vision transformer (ViT), have been dominating the field of the FAS. …”
Get full text
Article -
4474
Research Progress in Small-Molecule Detection Using Aptamer-Based SERS Techniques
Published 2025-01-01Get full text
Article -
4475
Analyzing, Modeling, and Simulation for Human Dynamics in Social Network
Published 2012-01-01Get full text
Article -
4476
Fortifying IoT Infrastructure Using Machine Learning for DDoS Attack within Distributed Computing-based Routing in Networks
Published 2024-06-01“…On the other hand, if we consider the conventional security approaches, these security devices mostly use traditional security protocols such as password encryption and user authentication respectively. …”
Get full text
Article -
4477
An Overview on The Pandemic Coronavirus Disease 2019 (COVID-19) Outbreak
Published 2020-05-01“…The other objective of this review was to encourage publics to treat the virus in safe way based on the discovery by researchers toward secure life of million peoples that could be infected by the 2019 new coronavirus. …”
Get full text
Article -
4478
Complementary Feeding Practices and Household Food Insecurity Status of Children Aged 6–23 Months in Shashemene City West Arsi Zone, Oromia, Ethiopia
Published 2022-01-01“…Household socioeconomic status (wealth index, food security status, household income) and child age were found to be among the factors statistically significantly associated with complementary feeding practices indicators.…”
Get full text
Article -
4479
A Framework for Fourth Industrial Revolution Adoption by Small-Scale Rural Farmers in Sub-Saharan Africa: A Systematic Literature Review
Published 2025-01-01“…This is a major global threat to agriculture and food security, especially for rural farmers. Small-scale rural-based farmers contribute immensely to local communities’ socio-economic well-being and food security. …”
Get full text
Article -
4480
Special Features of the Crime’s Subject Under the Article 330 of the Criminal Code of Ukraine
Published 2019-03-01“…As a result, the author has come to the conclusion that a special subject of the crime under the Art. 330 of the Criminal Code of Ukraine may be officers of the departments of the National Police of Ukraine, the State Investigation Bureau, the Security Service of Ukraine, the Foreign Intelligence Service of Ukraine, the State Border Guard Service of Ukraine, the Office of State Security, the State Fiscal Service of Ukraine, the State Penal Service of Ukraine, the Ministry of Defense of Ukraine, the President of Ukraine, officials of the President’s Administration of Ukraine, Verkhovna Rada of Ukraine, Cabinet of Ministers of Ukraine, National Security and Defense Council of Ukraine, Supreme High Command General Headquarters of Ukraine, the Ministry of Defense of Ukraine, the General Staff of Armed Forces of Ukraine, the unions, military units and units of the Armed Forces of Ukraine, the State Special Transport Service, the State Service for Special Communications and Information Protection of Ukraine, the National Guard of Ukraine, the Council of Ministers of the Autonomous Republic of Crimea, regional, district, city and district in the cities, state administrations and local self-government agencies, as well as officials of enterprises, institutions and organizations that carry out state defense orders, conduct research and perform development in the defense area, etc.…”
Get full text
Article