Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4941
ECP-IEM: Enhancing seasonal crop productivity with deep integrated models.
Published 2025-01-01“…Accurate crop yield forecasting is vital for ensuring food security and making informed decisions. With the increasing population and global warming, addressing food security has become a priority, so accurate yield forecasting is very important. …”
Get full text
Article -
4942
A study of Belarusian women’s perceptions of safety and its relationships with victimization and social gender
Published 2024-10-01“…It has been shown that for women security is associated with such concepts as peace in their country, reliability, health, and control of the situation. …”
Get full text
Article -
4943
A New Sensors-Based Covert Channel on Android
Published 2014-01-01“…New platforms invoke thorough investigations to assess their security. Now is the time for Android platform to analyze its security model, in particular the two key principles: process-isolation and the permissions system. …”
Get full text
Article -
4944
Ulovlig påvirkningsvirksomhet i samarbeid med fremmed etterretningstjeneste
Published 2021-12-01“…According to Danish authorities, Denmark is facing a sustained threat to national security from hostile states, and the wide-reaching ban on »unlawful influence activities« is deemed necessary to counter such offences aimed at the Danish authorities and the general public. …”
Get full text
Article -
4945
DNNobfus: a study on obfuscation-based edge-side model protection framework
Published 2024-04-01“…The proliferation of artificial intelligence models has rendered them vulnerable to a myriad of security threats. The extensive integration of deep learning models into edge devices has introduced novel security challenges. …”
Get full text
Article -
4946
Universal patching method for side-channel vulnerabilities based on atomic obfuscation
Published 2022-04-01“…Executing code containing side-channel vulnerabilities exhibits different non-functional behaviors related to inputs.Attackers can obtain these behaviors by leveraging micro architecture side-channel attacks and then analyze the pattern between the behaviors and the inputs to access sensitive data.Vulnerability repairing at the software layer brings low overheads to a program’s execution.Besides, it does not require modifying hardware or system, which enables fast patching and widespread deployment.It becomes the mainstream strategy applied to the current cryptographic implementations.However, existing solutions are deeply bound to the program’s implementation and requires manual intervention.This brings challenge to implement and is not versatile enough.A general patching method was proposed for side-channel vulnerabilities that combined dynamic obfuscated execution with hardware atomic transaction.To hide the real accesses of the side-channel vulnerabilities of a program, the proposed method inserted dynamic confusing accesses into the vulnerabilities.To avoid an attacker using fine-grained side-channel attack to distinguish the real access and the confusing access, both of them were encapsulated as transactions and they were guaranteed to be uninterrupted during the running period.In addition, a prototype system called SC-Patcher was implemented based on the LLVM compiler.Various optimization strategies were supported, including secure springboard and transaction aggregation, to further improve system security and performance.Experimental results show that the proposed method makes it impossible for an attacker to restore accurate sensitive data through side-channel attack, and it also brings almost no additional performance overhead to the program.…”
Get full text
Article -
4947
Prioritizing Signaling Information Transmission in Next Generation Networks
Published 2011-01-01Get full text
Article -
4948
Geomodeling soil quality using remote sensing and land use metrics in Abeokuta, Nigeria
Published 2025-01-01“…The findings suggest valuable ways for SQ improvement and could contribute to efforts on achieving food security, well-being and meet sustainable development goal 2.…”
Get full text
Article -
4949
The Kurdish Movement’s Factor in US Politics at the Peak of Iran and Afghanistan Crises, 1979 – January 1981
Published 2023-11-01“…Faced with the challenges presented by the Iranian and Afghan crises, the United States' analytical, intelligence, and military bodies navigated various resources in search of viable solutions.This study delves into the consideration of the Kurdish factor as a potential instrument in shaping the regional landscape. The National Security Council (NSC), State Department, Central Intelligence Agency (CIA), and the US Department of Defense all scrutinized the Kurdish movement, evaluating its prospects for advancing American interests. …”
Get full text
Article -
4950
-
4951
-
4952
Prediction method of 0day attack path based on cyber defense knowledge graph
Published 2022-02-01“…To solve the difficulty of attack detection caused by the 0day vulnerability, a prediction method of 0day attack path based on cyber defense knowledge graph was proposed.The cyber defense knowledge graph was constructed to refine the discrete security data such as threat, vulnerability and asset into the complete and high-related knowledge format by extracting concepts and entities related to network attack from cyber security ontology research finds and databases.Based on the knowledge integrated by the knowledge graph, assumed and restricted the unknown attributes such as the existence, availability and harmfulness of 0day vulnerabilities, and model the concept of "attack" as a relationship between attacker entities and device entities in the knowledge graph to transform the attack prediction to the link prediction of knowledge graph.According to this, apply path ranking algorithm was applied to mine the potential 0day attack in the target system and construct the 0day attack graph.Predicted the 0day attack path by utilizing the scores output by classifiers as the occurrence probabilities of single step attack and computing the occurrence probabilities of different attack paths.The experimental result shows that with the help of complete knowledge system provided by knowledge graph, the proposed method can reduce the dependence of prediction analysis on expert model and overcome the bad influence of 0day vulnerability to improve the accuracy of 0day attack prediction.And utilizing the characteristic that path ranking algorithm reasons based on the structure of graph can also help to backtrack the reasons of predicting results so as to improve the explainability of predicting.…”
Get full text
Article -
4953
AccFIT-IDS: accuracy-based feature inclusion technique for intrusion detection system
Published 2025-12-01“…In today’s digital landscape, maintaining security has become increasingly difficult. Many organizations implement security mechanisms to protect their valuable resources from potential threats. …”
Get full text
Article -
4954
Design of Liquified Petroleum Gas (LPG) Leak Detection Tool with Buzazer nd Telegram based on IOT
Published 2024-11-01“…The development of Internet of Things (IoT) technology has made a major contribution to increasing efficiency and security in various fields. One of the growing applications is the use of IoT in gas leak detection to maintain a safe environment. …”
Get full text
Article -
4955
Association between Cardiac Hypertrophy and Sex of Patients from a Hospital in Ecuador
Published 2024-01-01“…<br /><strong>Objective:</strong> determine the association between cardiac hypertrophy and sex of patients in a hospital of the Ecuadorian Institute of Social Security. <br /><strong>Methods:</strong> a descriptive and cross-sectional study was carried out in December 2022 in a hospital of the Ecuadorian Social Security Institute. 88 patients were analyzed distributed into two groups: male and female, each with 44 patients. …”
Get full text
Article -
4956
Short-Term Prediction of Electronic Transformer Error Based on Intelligent Algorithms
Published 2020-01-01Get full text
Article -
4957
Predicting the Compressive Strength of Recycled Concrete Using Ensemble Learning Model
Published 2025-01-01Get full text
Article -
4958
Protecting Florida Panthers by Protecting Domestic Animals: Building a "Panther-Proof" Pen
Published 2016-11-01“…To maintain support for panther conservation, it is paramount that rural residents protect and secure their pets and livestock. This 3-page fact sheet explains how to make a locking, secure enclosure to protect livestock from panther predation—and protect the fragile panther, as well. …”
Get full text
Article -
4959
Transformation in European Defence Supply Chains as Ukraine Conflict Fuels Demand
Published 2025-01-01“…This study contributes to a deeper understanding and theoretical advancement in managing military and security challenges, with particular emphasis on enhancing readiness, resilience, and the scaling of military capabilities across cross-border defence supply chains.…”
Get full text
Article -
4960
On Stability of Multi-Valued Nonlinear Feedback Shift Registers
Published 2019-01-01Get full text
Article