Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4721
Collusion node detection method based on fuzzy evaluation density clustering in Internet of vehicles
Published 2023-07-01“…In order to solve the security problems caused by collusion of malicious vehicles in the open Internet of vehicles environment, a collusion node detection method based on fuzzy evaluation density clustering was designed.The method realized vehicle reputation update through subjective recommendation trust, objective data trust and historical reputation.Two rounds malicious node detection method was designed to detect malicious vehicles, in the first round, fuzzy comprehensive evaluation was used to screen out a single malicious vehicle node, and in the second round, the conspiracy malicious vehicle nodes were searched by the improved density clustering method according to a single malicious vehicle node to ensure the sustainable development of network environment security.Experimental results show that the proposed method has a high recognition rate for malicious vehicles, and when the proportion of malicious vehicles reaches 30%, the detection accuracy can still remain above 90%.At the same time, under the proportion of different malicious vehicles, the detection recall rate and detection F value still remain higher value, indicating that the proposed method has a high stability.For the change of total vehicle nodes, the performance evaluation index shows a small fluctuation and remain within the range from 80% to 100%.…”
Get full text
Article -
4722
Reliability of Critical Fitness Tests for Police Officers
Published 2025-01-01Get full text
Article -
4723
THE UTILITY OF EARLY WARNING SYSTEM AND CRIME PREVENTION: A STUDY OF THE ABDUCTION OF SCHOOL CHILDREN IN NIGERIA
Published 2022-05-01“…This is essential for interrogation, as the abduction of school children has become a threat to national security. The paper used qualitative data from secondary literature and conceptualized theories of early warning signs to provide a theoretical base for its argument. …”
Get full text
Article -
4724
Effectiveness of the Spatial Domain Techniques in Digital Image Steganography
Published 2024-03-01“… Digital steganography is a new and extremely demanding method for transmitting information securely over the internet while employing a covert device. …”
Get full text
Article -
4725
User authentication of industrial internet based on HHT transform of mouse behavior
Published 2022-06-01“…The rapid development of the industrial internet had caused widespread concern about the network security, and the end-user authentication technology was considered a research hotspot.According to the characteristics of human-computer interaction in industrial internet, an experimental website was designed.24 users' mouse behavior data in an uncontrolled environment were collected within 2.5 years to conduct case studies.Hilbert-Huang transform (HHT) was used to extract frequency domain features of mouse behavior signals, combined with time domain features to form a time-frequency joint domain feature matrix of 163-dimensional to characterize user mouse behavior patterns.Bagged tree, support vector machine (SVM), Boost tree and K-nearest neighbor (KNN) were used to build a user authentication model, and the comparison result showed that the Bagged tree had the best internal detection effect in this case, with an average false acceptance rate (FAR) of 0.12% and an average false rejection rate (FRR) of 0.28%.In external detection, the FAR was 1.47%.Compared with the traditional mouse dynamics method, the frequency domain information of mouse behavior extracted by HHT can better realize the user authentication, and provide technical support the security of the industrial internet.…”
Get full text
Article -
4726
On the problems of modern engineers' training in the field of materials science: the methodological aspect
Published 2018-06-01“…And since in a technologically advanced society material science largely determines both the level of functioning and security of the state and the comfort of the everyday life of an individual, the problems of improving the training of specialists in this field may be of interest to a wide range of readers of the journal.…”
Get full text
Article -
4727
Spending blood for oil in Nigeria: a frame analysis of Shell’s neutralisation of acts that led to corporate-initiated state crime
Published 2019-12-01“…Despite their peaceful nature, these protests have been met with lethal violence by the Nigerian security forces. Accusations have been levelled against Shell for liability for human rights violations, but the company has denied responsibility. …”
Get full text
Article -
4728
Cyberterrorism: content, forms and promising countermeasures
Published 2023-10-01“…The counteraction system may be based on the following: proper regulation of the concept of cyber terrorism in national legislation, criminalisation of acts of cyber terrorism and its components; enhancing the security and protection of critical information infrastructure; improving existing and applying new counteraction methods; improving cooperation in the field of combating cyber terrorism.…”
Get full text
Article -
4729
Control-flow integrity technology based on the combination of software and hardware
Published 2024-10-01“…For shadow stack, balancing security and performance was difficult, and the forward CFI (control-flow integrity) scheme implemented by software was too expensive and difficult to be deployed in practice. …”
Get full text
Article -
4730
YOUTHS PROTEST IN NIGERIA: THE ENDSARS IN PERSPECTIVE
Published 2022-05-01“…However, where neglected, unskilled and lacked the requisite social security in the event of poor governance, low education, poor investment environment and other essential qualities of lives, youths becomeliability, threat and object of national instability to their country. …”
Get full text
Article -
4731
CP-ABE based users collaborative privacy protection scheme for continuous query
Published 2017-09-01“…In location-based services (LBS),as the untrusted LBS server can be seen as an adversary,and it can utilize the attribute as background knowledge to correlate the real location of the user in the set of uncertain locations.Then the adversary can gain the location privacy when the user enjoys the snapshot and continuous query through the correlation inference attack.In order to cope with this attack,the main scheme in privacy protection is to generalize the attribute and achieve attribute anonymity.However,algorithms of this type usually assumes a trusted third party (TTP) which provides the service of similarity attribute finding and comparing,and it is unpractical in the real environment,as the TTP may become the point of attack or the bottleneck of service and it cannot be considered as the trusted one all the time.Thus,to cope with the correlation inference attack as well as the semi-trusted third party,ciphertext policy attribute based encryption (CP-ABE) and users collaboration based attribute anonymous scheme was proposed.In this scheme,the user coupled achieve location and attribute anonymity.Furthermore,this scheme could also provide security for attacks from the semi-trusted third party as well as semi-trusted collaborative users.At last,security analysis and the experiment results further verify the effectiveness of privacy protection and the efficiency of algorithm execution.…”
Get full text
Article -
4732
Impact of Occlusion Masks on Gender Classification from Iris Texture
Published 2024-01-01Get full text
Article -
4733
Time synchronization attack detection for industrial wireless network
Published 2023-06-01“…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
Get full text
Article -
4734
State, Refugees, and Civil Society in Turkey: Transformation Under Control
Published 2024-02-01“…Furthermore, state-driven cross-border humanitarian operations and security-oriented state policies also shape this landscape. …”
Get full text
Article -
4735
Functions and Authorities of the Armed Forces of Ukraine on the Crime Scene
Published 2019-12-01“…It is emphasized that in order to ensure the implementation of the said functions of the Armed Forces of Ukraine, they have the right to take measures to restore the territorial integrity of Ukraine, as well as to provide comprehensive development of secure, economic, information, telecommunication, social and humanitarian infrastructure on the territories adjacent to the temporarily occupied territories in Donetsk and Luhansk to implement, in accordance with strategic defense planning documents, measures to strengthen defense and security capabilities of the country. …”
Get full text
Article -
4736
Toward sustainable desalination: a patent analysis of technology-development trajectories
Published 2025-01-01“…Research and development (R&D) in desalination has enabled innovations and expanded global water-supply capacity to enhance water security. Despite increased desalination capacity, significant sustainability concerns persist. …”
Get full text
Article -
4737
Microcluster-Based Incremental Ensemble Learning for Noisy, Nonstationary Data Streams
Published 2020-01-01Get full text
Article -
4738
Attacks on Telex Internet anticensorship system
Published 2014-09-01“…As a typical router-redirecting based anticensorship system,Telex poses new challenges for Internet censors.To help common users evade Internet censorship,Telex employs network routers,rather than end-hosts,to relay network traffics to blocked destinations.The security of Telex from the censors' perspective is analyzed,and two kinds of active attacks aiming to break users' privacy are presented.The first is a kind of DoS attack,which exploits a security flaw of Telex handshake protocol.It can probabilistically identify the users who are using Telex,as well as break the availability of Telex.An improved handshake protocol to remedy the flaw is also proposed.The second is called TCP packets by-passing attack.Under that attacking scenario,censors make a small fraction of TCP packets from clients bypass the router and reach the cover site directly through asymmetric routing paths or IP tunnels,then determine whether a user is utiliz-ing Telex by observing the reaction of upstream traffic.The feasibility of bypassing attack has been testified by a series of experiments in a prototype environment.The bypassing attack is also applicable to other router-redirecting based anti-censorship systems.…”
Get full text
Article -
4739
Orthogonal Latin square theory based group and batch verification for digital signatures
Published 2022-02-01“…In order to solve the problem of fast security verification of massive and time-intensive messages on a central node in situational awareness networks, orthogonal Latin square theory based scheme was considered.Considering efficiency promotion of security verification of messages, group design of digital signatures based on orthogonal Latin square theory was formulated, batch verification of digital signatures was processed by aggregate signature, then an efficient, parallel and non-adaptive batch verification scheme of digital signatures was proposed in according with multiple processors.Theoretical analysis and simulation results demonstrate that it will be able to identify n digital signatures by approximately <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <msqrt> <mi>n</mi> </msqrt> </math></inline-formula> times given the upper bound d (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mi>d</mi><mo>≪</mo><mi>n</mi></math></inline-formula>) of invalid digital signatures, together with higher time-efficiency and stronger error-tolerance by comparing with individual testing and binary splitting algorithms especially when multiple processors are available.…”
Get full text
Article -
4740
Hortas urbanas – História, Classificação, Benefícios e Perspectivas.
Published 2022-06-01“…In recent decades, Brazil has promoted policies at federal, state and municipal level with the aim of supporting community garden projects in order to play a role in reducing poverty and ensuring food security.…”
Get full text
Article