Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4821
Revocable identity-based proxy re-signature scheme in the standard model
Published 2019-05-01“…User revocation is necessary to the practical application of identity-based proxy re-signature scheme.To solve the problem that the existing identity-based proxy re-signature schemes cannot provide revocation functionality,the notion of revocable identity-based proxy re-signature was introduced.Furthermore,the formal definition and security model of revocable identity-based proxy re-signature were presented.Based on proxy re-signature scheme and binary tree structure,a revocable identity-based proxy re-signature scheme was proposed.In the proposed,scheme,the user's signing key consists of two parts,a secret key and an update key.The secret key transmitted over the secure channel is fixed,but the update key broadcasted by the public channel is periodically changed.Only the user who has not been revoked can obtain the update key,and then randomize the secret key and update the key to generate the corresponding signature key of the current time period.In the standard model,the proposed scheme is proved to be existentially unforgeable against adaptive chosen-identity and chosen-message attacks.In addition,the proposed scheme has properties of bidirectionality and multi-use,and can resist signing key exposure attacks.The analysis results show that the proposed scheme can efficiently revoke the user and update the user’s key,and thus it has good scalability.…”
Get full text
Article -
4822
-
4823
Advancements in training and deployment strategies for AI-based intrusion detection systems in IoT: a systematic literature review
Published 2025-01-01“…Abstract As the Internet of Things (IoT) grows, ensuring robust security is crucial. Intrusion Detection Systems (IDS) protect IoT networks from various cyber threats. …”
Get full text
Article -
4824
Emergency Water Supply Dispatching Model for Saving and Storing Fresh Water in River Network Areas Influenced by Saltwater Intrusion
Published 2025-01-01“…Besides, when the salinity of Modaomen Waterway exceeds the standard level, Tielushan Reservoir is employed to drain the fresh water and regulate the salinity, which can further improve the water supply security and alleviate the influence of saltwater intrusion.…”
Get full text
Article -
4825
A Big Data Analytics Approach for Dynamic Feedback Warning for Complex Systems
Published 2020-01-01Get full text
Article -
4826
Digital Literacy Education Among Students: Status, Pathways, and Implications in the Current Digital Era
Published 2025-02-01“…However, students from urban areas demonstrate significantly higher digital literacy levels compared to those from rural areas, particularly in security and privacy domains. The findings underscore the need for targeted interventions to enhance digital literacy in areas such as digital content creation and problem-solving. …”
Get full text
Article -
4827
Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review
Published 2024-01-01“…The paper presents a systematic review of intrusion detection in Internet of Things (IoT) networks using multi-objective optimization algorithms (MOA), to identify attempts at exploiting security vulnerabilities and reducing the chances of security attacks. …”
Get full text
Article -
4828
Optimalisasi Strategi Idarah: Studi Kasus Pengelolaan Masjid Agung Kauman di Kota Semarang
Published 2024-06-01“…The data obtained are: First, the blood of the Great Mosque of Kauman Semarang can be said to be good, because from the data collected with the daily mosque secretary there are security guards and marbots who handle mosque security and administration runs in an orderly manner. …”
Get full text
Article -
4829
Ungoverned Spaces and Menace of Herder-Farmer Conflictin Ondo State, South West Nigeria
Published 2023-03-01“…Drones can be deployed to monitor the operation of herders in the forests. Amotekun security outfit should be trained and adequately equipped with weapons for maximum delivery.…”
Get full text
Article -
4830
A Rectangular Planar Spiral Antenna for GIS Partial Discharge Detection
Published 2014-01-01Get full text
Article -
4831
Ear Biometric Identification based on Gabor Filters using Backpropagation Neural Networks
Published 2024-11-01“…The development of reliable security systems is crucial for protecting personal information and access control. …”
Get full text
Article -
4832
Comparison of Insertion Characteristics of Prewarmed Igel and I-gel at Room Temperature in Adult Patients Undergoing Elective Surgeries- A Randomized Control Trial
Published 2025-01-01“…In Group C, airway was secured with Igel at room temperature. In Group W, patients airway was secured with I-gel which was prewarmed at 42˚Celsius. …”
Get full text
Article -
4833
High-performance directional fuzzing scheme based on deep reinforcement learning
Published 2023-04-01“…With the continuous growth and advancement of the Internet and information technology, continuous growth and advancement of the Internet and information technology.Nevertheless, these applications’ vulnerabilities pose a severe threat to information security and users’ privacy.Fuzzing was widely used as one of the main tools for automatic vulnerability detection due to its ease of vulnerability recurrence and low false positive errors.It generates test cases randomly and executes the application by optimization in terms of coverage or sample generation to detect deeper program paths.However, the mutation operation in fuzzing is blind and tends to make the generated test cases execute the same program path.Consequently, traditional fuzzing tests have problems such as low efficiency, high randomness of inputs generation and limited pertinence of the program structure.To address these problems, a directional fuzzing based on deep reinforcement learning was proposed, which used deep reinforcement learning networks with information obtained by staking program to guide the selection of the inputs.Besides, it enabled fast approximation and inspection of the program paths that may exist vulnerabilities.The experimental results showed that the proposed approach had better performance than the popular fuzzing tools such as AFL and AFLGO in terms of vulnerability detection and recurrence on the LAVA-M dataset and real applications like LibPNG and Binutils.Therefore, the approach can provide support for further vulnerability mining and security research.…”
Get full text
Article -
4834
Integrity of Best-Answer Assignments in Large Enrollment Classes; the role of Compulsory Attribution
Published 2024-12-01“…A unique feature that makes this method well-suited to large enrollment classes is the ability to secure and, when necessary, to delete stolen work, thereby precluding misappropriation. …”
Get full text
Article -
4835
A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks
Published 2014-01-01Get full text
Article -
4836
Review of malware detection and classification visualization techniques
Published 2023-10-01“…With the rapid advancement of technology, network security faces a significant challenge due to the proliferation of malicious software and its variants.These malicious software use various technical tactics to deceive or bypass traditional detection methods, rendering conventional non-visual detection techniques inadequate.In recent years, data visualization has gained considerable attention in the academic community as a powerful approach for detecting and classifying malicious software.By visually representing the key features of malicious software, these methods greatly enhance the accuracy of malware detection and classification, opening up extensive research opportunities in the field of cyber security.An overview of traditional non-visual detection techniques and visualization-based methods were provided in the realm of malicious software detection.Traditional non-visual approaches for malicious software detection, including static analysis, dynamic analysis, and hybrid techniques, were introduced.Subsequently, a comprehensive survey and evaluation of prominent contemporary visualization-based methods for detecting malicious software were undertaken.This primarily encompasses encompassed the integration of visualization with machine learning and visualization combined with deep learning, each of which exhibits distinct advantages and characteristics within the domain of malware detection and classification.Consequently, the holistic consideration of several factors, such as dataset size, computational resources, time constraints, model accuracy, and implementation complexity, is necessary for the selection of detection and classification methods.In conclusion, the challenges currently faced by detection technologies are summarized, and a forward-looking perspective on future research directions in the field is provided.…”
Get full text
Article -
4837
Breeding Maize (Zea mays L.) for Aluminum Tolerance through Heterosis and Combining Ability
Published 2024-01-01“…Soil acidity, a major threat to food security in developing countries, can cause a staggering 71% decline in maize (Zea mays L.) production. …”
Get full text
Article -
4838
An Analysis of the Legal Standard in the Fight Against Torture and Treatment of Prisoners under International Law: What Prospect for Application under Cameroonian Law?
Published 2020-02-01“…Cameroon in its compliance with the international standard set, has contributed enormously by enacting credible laws which varies from its constitution, criminal codes, and other relevant provision all in the aim of safeguarding and ensuring that this right should be treated with lots of human protection and security. Even though with efforts laid in place by the country through its various legal and institutional dispositions, prohibition and protection has continued to be considered as a nightmare, as we continue in experiencing violations of this fundamental right by those who were vested with the powers and competent in ensuring and securing this sacred right. …”
Get full text
Article -
4839
Slope Reinforcement Mechanism and Stability Analysis of <italic>Ophiopogon bodinieri</italic> Under Rainfall Conditions
Published 2024-01-01“…The displacement of slope surface soil and the security coefficient of slope under different rainfall conditions were analyzed. …”
Get full text
Article -
4840