Showing 4,801 - 4,820 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 4801

    MODERN CYBERNETIC TERRORISM AND HIS SOCIAL CONSEQUENCES by N. Grigoriev, E. Rodyukov

    Published 2016-05-01
    “…Given that policy now covers all spheres of public life and, therefore, increasing the problem of information security of society in General and each person in particular. …”
    Get full text
    Article
  2. 4802

    Signature Scheme Using the Root Extraction Problem on Quaternions by Baocang Wang, Yupu Hu

    Published 2014-01-01
    “…The performance and other security related issues are also discussed.…”
    Get full text
    Article
  3. 4803

    Food economics : industry and markets / by Hansen, Henning Otte, 1959-

    Published 2013
    View in OPAC
    Book
  4. 4804

    A Detection Method Against Load Redistribution Attacks in the Interdependence of the Natural Gas Network and Power System Based on Entropy by Yaoying Wang

    Published 2023-09-01
    “…The findings indicate that the detector based on entropy exhibits efficacy in detecting both stochastic and purposeful attacks, thereby augmenting the security of interconnected gas and electricity networks.…”
    Get full text
    Article
  5. 4805

    Attitudes and preferences toward the adoption of voice-controlled intelligent personal assistants: Evidence from Croatia by Antun Biloš, Bruno Budimir, Borna Kraljević

    Published 2023-06-01
    “…The main research focus was set on attitudes and perceptions of users and non-users related to benefits and barriers of IPA adoption, privacy and security issues, trust as well as mobile phone usage patterns, motivators, and associated smartphone digital literacy. …”
    Get full text
    Article
  6. 4806

    RUSSIA IN THE GLOBAL INFORMATION SOCIETY by E. S. Zinovieva

    Published 2016-06-01
    “…Russian diplomacy is trying to foster the development of global rules regulating the information society and information security based on respect for sovereignty and equality of states. …”
    Get full text
    Article
  7. 4807

    Empowering drones in vehicular network through fog computing and blockchain technology. by Shivani Wadhwa, Divya Gupta, Shalli Rani, Maha Driss, Wadii Boulila

    Published 2025-01-01
    “…The contribution includes a systematic architecture design and integration of blockchain technology for secure data storage. Fog computing was introduced for the Drone with Blockchain Technology (FCDBT) model, where drones collaborate to process IoT data efficiently. …”
    Get full text
    Article
  8. 4808
  9. 4809

    Encrypted traffic identification scheme based on sliding window and randomness features by LIU Jiachi, KUANG Boyu, SU Mang, XU Yaqian, FU Anmin

    Published 2024-08-01
    “…With the development of information technology, network security has increasingly become a focal point for users and organizations, and encrypted data transmission has gradually become mainstream. …”
    Get full text
    Article
  10. 4810

    Zero-Shot Traffic Identification with Attribute and Graph-Based Representations for Edge Computing by Zikui Lu, Zixi Chang, Mingshu He, Luona Song

    Published 2025-01-01
    “…Experimental results on IoT datasets demonstrate that AG-ZSL achieves exceptional performance in classifying both known and unknown traffic, highlighting its potential for enhancing secure and efficient traffic management at the network edge.…”
    Get full text
    Article
  11. 4811

    Performance Comparison of IoT Classification Models using Ensemble Stacking and Feature Importance by nabila putri setiawan, Adhitya Nugraha, Ardytha Luthfiarta, Yudha Mulyana

    Published 2024-11-01
    “…Internet of Things (IoT) security is becoming a top priority as the number of connected devices increases online. …”
    Get full text
    Article
  12. 4812

    Defense scheme for the world state based attack in Ethereum by Zhen GAO, Dongbin ZHANG, Xiao TIAN

    Published 2022-04-01
    “…Ethereum is taken as the representative platform of the second generation of blockchain system.Ethereum can support development of different distributed applications by running smart contracts.Local database is used to store the account state (named world state) for efficient validation of transactions, and the state root is stored in the block header to guarantee the integrity of the state.However, some researches revealed that the local database could be easily tempered with, and attackers can issue illegal transactions based on the modified account state to obtain illegitimate benefits.This world-state based security problem was introduced, and the preconditions for attack were analyzed.Compared with the two common security threats under the PoW (proof of work) consensus, it was found that when the attacker controls the same mining computing power, the world-state based attack brought higher risk, and the success rate approached 100%.In order to deal with this threat, a practical scheme for attack detection and defense was proposed accordingly.The secondary verification and data recovery process were added to the Ethereum source code.The feasibility and complexity of the proposed scheme was evaluated with single-machine multi-threading experiments.The proposed scheme improves Ethereum’s tolerance to malicious tampering of account state, and is applicable to other blockchain platforms applying local database for transaction validation, such as Hyperledger Fabric.In addition, the time and computational overhead brought by the proposed scheme are not prominent, so it has good applicability and induces acceptable impact on the performance of original system.…”
    Get full text
    Article
  13. 4813

    Effects of Integrated Soil Fertility Management Technologies on the Productivity of Sorghum in the Drier Parts of Upper Eastern Kenya by Hezron Mogaka, Shadrack Kiprotich

    Published 2025-01-01
    “…Similarly, the results have wider policy effects for agriculture, especially in places where ISFM may be very important for long-term food security and agricultural productivity.…”
    Get full text
    Article
  14. 4814

    La politique de réconciliation nationale en Algérie : une approche sécuritaire by Mansour Kedidir

    Published 2022-01-01
    “…In order to restore peace and security, the government undertook a reconciliation process characterized by three phases: Clemency measures in the criminal field and two policies of civil concord and national reconciliation. …”
    Get full text
    Article
  15. 4815
  16. 4816

    A Data-Driven Approach for Reactive Power Optimization Incorporating Interval Values for Renewable Power Generation by Honglei Jia, Cong Zhang, Jieming Du, Na Kuang

    Published 2023-01-01
    “…The increasing integration of renewable energy sources into modern electric grids has led to a rise in uncertain factors that must be managed to maintain voltage security during reactive power optimization (RPO). …”
    Get full text
    Article
  17. 4817

    EFFECT OF SOCIAL MEDIA IN PROMOTING INSECURITY AND PROPAGANDA IN NIGERIA by ABDULWAHAB ABDULKABIR, NURUDEEN SOLA IBRAHIM

    Published 2024-07-01
    “…It was also discovered that the regulation of social media in Nigeria for security purpose is very poor, which is a matter of concern to the citizens. …”
    Get full text
    Article
  18. 4818

    ANALYSIS OF DIMENSIONS AND TRENDS IN THE DIGITAL TRANSFORMATION OF CUSTOMS SYSTEMS by RĂCĂTĂIAN RALUCA IOANA

    Published 2024-12-01
    “…Next, the study will examine the implementation and strengthening of the Customs Integrated Information System (SIIV), which integrates various subsystems and improves data exchange, security and accessibility of information. It will also assess the long-term impact of digital transformation, including the adoption of emerging technologies such as blockchain and artificial intelligence, as well as aligning with the dynamics of changes in global trade, with the aim of effectively supporting international trade and ensuring its security. …”
    Get full text
    Article
  19. 4819

    Frequency-bin-encoded entanglement-based quantum key distribution in a reconfigurable frequency-multiplexed network by Anahita Khodadad Kashi, Michael Kues

    Published 2025-01-01
    “…Abstract Large-scale quantum networks require dynamic and resource-efficient solutions to reduce system complexity with maintained security and performance to support growing number of users over large distances. …”
    Get full text
    Article
  20. 4820

    Important factors in municipality-based pediatric palliation from healthcare professionals’ perspective: A qualitative study by Kristin Skjærseth, Natalie Preminger, May Aasebø Hauken

    Published 2025-01-01
    “…Conclusion: The importance of establishing security and predictability in municipality-based PPC was emphasized. …”
    Get full text
    Article