Showing 4,461 - 4,480 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 4461

    Survey of Artificial Intelligence Model Marketplace by Mian Qian, Abubakar Ahmad Musa, Milon Biswas, Yifan Guo, Weixian Liao, Wei Yu

    Published 2025-01-01
    “…It further explores the AI model life-cycle, highlighting pricing, trading, tracking, security, and compliance challenges. This detailed analysis is intended for an audience with a foundational understanding of AI systems, marketplaces, and their operational ecosystems. …”
    Get full text
    Article
  2. 4462

    Data-Driven Technologies for Energy Optimization in Smart Buildings: A Scoping Review by Joy Dalmacio Billanes, Zheng Grace Ma, Bo Nørregaard Jørgensen

    Published 2025-01-01
    “…Despite the benefits, challenges such as high initial costs, technical complexities, security risks, and user acceptance hinder their widespread adoption. …”
    Get full text
    Article
  3. 4463

    Zero-Trust Access Control Mechanism Based on Blockchain and Inner-Product Encryption in the Internet of Things in a 6G Environment by Shoubai Nie, Jingjing Ren, Rui Wu, Pengchong Han, Zhaoyang Han, Wei Wan

    Published 2025-01-01
    “…This mechanism ensures data security while maintaining system efficiency in environments with large-scale data interactions.…”
    Get full text
    Article
  4. 4464

    Using the WHO building blocks to examine cross-border public health surveillance in MENA by Laura Buback, Shayanne Martin, Esbeydy Pardo, Farah Massoud, Jesus Formigo, Atousa Bonyani, Noha H. Farag, Zayid K. Almayahi, Kenta Ishii, Susie Welty, Dana Schneider

    Published 2025-02-01
    “…In conclusion, the WHO HSS Building Block Framework provides a comprehensive approach to assessing and improving cross-border public health surveillance and enhancing health security and equity in MENA. Strengthening cross-border surveillance systems may help MENA countries meet IHR requirements, achieve greater health security, and advance health equity among all types of mobile populations. …”
    Get full text
    Article
  5. 4465
  6. 4466

    Implementasi Algoritme Morus V2 untuk Pengamanan Data Pada Perangkat Bluetooth Low Energy by Diah Ratih Destyorini, Ari Kusyanti, Reza Andria Siregar

    Published 2022-12-01
    “…Data transmission will be insecure without a data security process. Cryptography is one of the options for securing data.  …”
    Get full text
    Article
  7. 4467
  8. 4468

    Dual-stack host discovery method based on SSDP and DNS-SD protocol by Fan SHI, Yao ZHONG, Pengfei XUE, Chengxi XU

    Published 2023-02-01
    “…With the exhaustion of the IPv4 addresses, the promotion and deployment of IPv6 has been accelerating.Dual-stack technology allows devices to enable both IPv4 and IPv6 protocols, which means that users are facing more security risks.Although the existing work can realize the identification and measurement of some dual-stack servers, the following problems still exist.Dual-stack host identification requires deep protocol identification of host services, but this method consumes too much scanning resources.Besides, network service providers may provide consistent services on distributed hosts, making it difficult to guarantee the accuracy of dual-stack host identification through service fingerprints.To solve these problems, the LAN service discovery protocol was used to bind host services to IP addresses, and a dual-stack host discovery method based on SSDP and DNS-SD protocols was proposed.In IPv4 network environment, the target host was induced to actively send a request to the constructed IPv6 server through SSDP protocol, and then the IPv6 address was extracted from the server’s log.Or the service list of the target host and its corresponding AAAA record was enumerated through the DNS-SD protocol and the IPv6 address of the target host was obtained, in order to realize the discovery of the dual stack address pairs.With this method, IPv6 addresses was obtained directly from the IPv4 host, which ensured the accuracy of the discovered dual-stack host.At the same time, only request packets for specific protocols were needed during the discovery process, which greatly saved scanning resources.Based on this method, the SSDP hosts and DNS-SD hosts accidentally exposed to the global IPv4 network were measured.A total number of 158k unique IPv6 addresses were collected, of which 55k were dual-stack host address pairs with globally reachable IPv6 addresses.Unlike existing work that focused on dual-stack servers, this method mainly targeted end-users and client devices, and built a unique set of active IPv6 devices and dual-stack host address pairs that have not been explored so far.Through the analysis of the obtained IPv6 address addressing type, it shows that IPv6 address is mainly generated in a random manner, which greatly reduces the possibility of IPv6 hosts being discovered by scanning.In particular, by measuring the ports and services of dual-stack hosts, we found that the security policy differences of dual-stack hosts on different protocol stacks.Especially, IPv6 protocol stack exposes more high-risk services, expanding the attack surface of hosts.The research results also show that the infeasibility of IPv6 address space traversal scanning mitigates the security risks of IPv6, but incorrect network configuration greatly increases the possibility of these high-risk IPv6 hosts being discovered and users should revisit IPv6 security strategy on dual-stack hosts.…”
    Get full text
    Article
  9. 4469

    Réprimer par le droit : L’intervention de la Brigade nationale de police judicaire dans les procès du Hirak El-Rif by Mariam Benalioua

    Published 2023-12-01
    “…Accused of "undermining state security", the arrested activists, considered to be the movement's leaders, were sentenced to between 5 and 20 years in prison. …”
    Get full text
    Article
  10. 4470

    Vegetation growth improvement Inadequately represents the ecological restoration of the Populus euphratica forests in Xinjiang, China by Xuefei Guo, Junli Li, Jiudan Zhang, Chunxia Wei, Zhijun Li

    Published 2025-01-01
    “…The Populus euphratica Oliv (P. euphratica) is a representative tree species in the riparian forests of arid regions, which acts as a barrier to prevent desert invasion and provides various ecosystem services for biodiversity conservation and ecological security. However, the community of P. euphratica has experienced significant shrinkage and ecological degradation over the past centuries due to natural and anthropogenic factors, particularly in the arid regions of Xinjiang, China. …”
    Get full text
    Article
  11. 4471
  12. 4472

    Perceptions of climatic variability among millet farmers: insights from tribal communities in the Kolli Hills, Tamil Nadu, South India by Rajendra R. Chapke, C. Tara Satyavathi, E. D. Israel Oliver King, Peddiveeti Laxmiprasanna, Vavilala Priyanka

    Published 2025-01-01
    “…Climate change has a diversified impact on the accessibility to resources and maintaining food security for the growing population. In this era, climate-resilient crops such as millet have greater importance and impact on the food security of the nation. …”
    Get full text
    Article
  13. 4473

    Learning deep forest for face anti-spoofing: An alternative to the neural network against adversarial attacks by Rizhao Cai, Liepiao Zhang, Changsheng Chen, Yongjian Hu, Alex Kot

    Published 2024-10-01
    “…Face anti-spoofing (FAS) is significant for the security of face recognition systems. neural networks (NNs), including convolutional neural network (CNN) and vision transformer (ViT), have been dominating the field of the FAS. …”
    Get full text
    Article
  14. 4474
  15. 4475
  16. 4476

    Fortifying IoT Infrastructure Using Machine Learning for DDoS Attack within Distributed Computing-based Routing in Networks by Sharaf Aldeen Abdulkadhum Abbas, Abdullahi Abdu Ibrahim

    Published 2024-06-01
    “…On the other hand, if we consider the conventional security approaches, these security devices mostly use traditional security protocols such as password encryption and user authentication respectively. …”
    Get full text
    Article
  17. 4477

    An Overview on The Pandemic Coronavirus Disease 2019 (COVID-19) Outbreak by Mariwan Abdulla Hama Salih

    Published 2020-05-01
    “…The other objective of this review was to encourage publics to treat the virus in safe way based on the discovery by researchers toward secure life of million peoples that could be infected by the 2019 new coronavirus. …”
    Get full text
    Article
  18. 4478

    Complementary Feeding Practices and Household Food Insecurity Status of Children Aged 6–23 Months in Shashemene City West Arsi Zone, Oromia, Ethiopia by Junayde Abdurahmen Ahmed, Kebede Kumsa Sadeta, Kelil Hussen Lembo

    Published 2022-01-01
    “…Household socioeconomic status (wealth index, food security status, household income) and child age were found to be among the factors statistically significantly associated with complementary feeding practices indicators.…”
    Get full text
    Article
  19. 4479

    A Framework for Fourth Industrial Revolution Adoption by Small-Scale Rural Farmers in Sub-Saharan Africa: A Systematic Literature Review by Willard Munyoka, Nkhangweni Lawrence Mashau, Modimowabarwa Kanyane

    Published 2025-01-01
    “…This is a major global threat to agriculture and food security, especially for rural farmers. Small-scale rural-based farmers contribute immensely to local communities’ socio-economic well-being and food security. …”
    Get full text
    Article
  20. 4480

    Special Features of the Crime’s Subject Under the Article 330 of the Criminal Code of Ukraine by V. Yu. Boichuk

    Published 2019-03-01
    “…As a result, the author has come to the conclusion that a special subject of the crime under the Art. 330 of the Criminal Code of Ukraine may be officers of the departments of the National Police of Ukraine, the State Investigation Bureau, the Security Service of Ukraine, the Foreign Intelligence Service of Ukraine, the State Border Guard Service of Ukraine, the Office of State Security, the State Fiscal Service of Ukraine, the State Penal Service of Ukraine, the Ministry of Defense of Ukraine, the President of Ukraine, officials of the President’s Administration of Ukraine, Verkhovna Rada of Ukraine, Cabinet of Ministers of Ukraine, National Security and Defense Council of Ukraine, Supreme High Command General Headquarters of Ukraine, the Ministry of Defense of Ukraine, the General Staff of Armed Forces of Ukraine, the unions, military units and units of the Armed Forces of Ukraine, the State Special Transport Service, the State Service for Special Communications and Information Protection of Ukraine, the National Guard of Ukraine, the Council of Ministers of the Autonomous Republic of Crimea, regional, district, city and district in the cities, state administrations and local self-government agencies, as well as officials of enterprises, institutions and organizations that carry out state defense orders, conduct research and perform development in the defense area, etc.…”
    Get full text
    Article