Showing 4,941 - 4,960 results of 9,720 for search '"Securities ', query time: 0.13s Refine Results
  1. 4941

    ECP-IEM: Enhancing seasonal crop productivity with deep integrated models. by Ghulam Mustafa, Muhammad Ali Moazzam, Asif Nawaz, Tariq Ali, Deema Mohammed Alsekait, Ahmed Saleh Alattas, Diaa Salama AbdElminaam

    Published 2025-01-01
    “…Accurate crop yield forecasting is vital for ensuring food security and making informed decisions. With the increasing population and global warming, addressing food security has become a priority, so accurate yield forecasting is very important. …”
    Get full text
    Article
  2. 4942

    A study of Belarusian women’s perceptions of safety and its relationships with victimization and social gender by I. V. Golyakova, V. А. Karpiyevich

    Published 2024-10-01
    “…It has been shown that for women security is associated with such concepts as peace in their country, reliability, health, and control of the situation. …”
    Get full text
    Article
  3. 4943

    A New Sensors-Based Covert Channel on Android by Ahmed Al-Haiqi, Mahamod Ismail, Rosdiadee Nordin

    Published 2014-01-01
    “…New platforms invoke thorough investigations to assess their security. Now is the time for Android platform to analyze its security model, in particular the two key principles: process-isolation and the permissions system. …”
    Get full text
    Article
  4. 4944

    Ulovlig påvirkningsvirksomhet i samarbeid med fremmed etterretningstjeneste by Martin Hennig

    Published 2021-12-01
    “…According to Danish authorities, Denmark is facing a sustained threat to national security from hostile states, and the wide-reaching ban on »unlawful influence activities« is deemed necessary to counter such offences aimed at the Danish authorities and the general public. …”
    Get full text
    Article
  5. 4945

    DNNobfus: a study on obfuscation-based edge-side model protection framework by SONG Feiyang, ZHAO Xinmiao, YAN Fei, CHENG Binlin, ZHANG Liqiang, YANG Xiaolin, WANG Yang

    Published 2024-04-01
    “…The proliferation of artificial intelligence models has rendered them vulnerable to a myriad of security threats. The extensive integration of deep learning models into edge devices has introduced novel security challenges. …”
    Get full text
    Article
  6. 4946

    Universal patching method for side-channel vulnerabilities based on atomic obfuscation by Deqing ZOU, Pan ZHANG, Wei LIU, Weijie CHEN, Yifan LU

    Published 2022-04-01
    “…Executing code containing side-channel vulnerabilities exhibits different non-functional behaviors related to inputs.Attackers can obtain these behaviors by leveraging micro architecture side-channel attacks and then analyze the pattern between the behaviors and the inputs to access sensitive data.Vulnerability repairing at the software layer brings low overheads to a program’s execution.Besides, it does not require modifying hardware or system, which enables fast patching and widespread deployment.It becomes the mainstream strategy applied to the current cryptographic implementations.However, existing solutions are deeply bound to the program’s implementation and requires manual intervention.This brings challenge to implement and is not versatile enough.A general patching method was proposed for side-channel vulnerabilities that combined dynamic obfuscated execution with hardware atomic transaction.To hide the real accesses of the side-channel vulnerabilities of a program, the proposed method inserted dynamic confusing accesses into the vulnerabilities.To avoid an attacker using fine-grained side-channel attack to distinguish the real access and the confusing access, both of them were encapsulated as transactions and they were guaranteed to be uninterrupted during the running period.In addition, a prototype system called SC-Patcher was implemented based on the LLVM compiler.Various optimization strategies were supported, including secure springboard and transaction aggregation, to further improve system security and performance.Experimental results show that the proposed method makes it impossible for an attacker to restore accurate sensitive data through side-channel attack, and it also brings almost no additional performance overhead to the program.…”
    Get full text
    Article
  7. 4947
  8. 4948

    Geomodeling soil quality using remote sensing and land use metrics in Abeokuta, Nigeria by Tobore Anthony, Anoke Emmanuel

    Published 2025-01-01
    “…The findings suggest valuable ways for SQ improvement and could contribute to efforts on achieving food security, well-being and meet sustainable development goal 2.…”
    Get full text
    Article
  9. 4949

    The Kurdish Movement’s Factor in US Politics at the Peak of Iran and Afghanistan Crises, 1979 – January 1981 by V. T. Yungblud, A. I. Sennikov

    Published 2023-11-01
    “…Faced with the challenges presented by the Iranian and Afghan crises, the United States' analytical, intelligence, and military bodies navigated various resources in search of viable solutions.This study delves into the consideration of the Kurdish factor as a potential instrument in shaping the regional landscape. The National Security Council (NSC), State Department, Central Intelligence Agency (CIA), and the US Department of Defense all scrutinized the Kurdish movement, evaluating its prospects for advancing American interests. …”
    Get full text
    Article
  10. 4950
  11. 4951
  12. 4952

    Prediction method of 0day attack path based on cyber defense knowledge graph by Cheng SUN, Hao HU, Yingjie YANG, Hongqi ZHANG

    Published 2022-02-01
    “…To solve the difficulty of attack detection caused by the 0day vulnerability, a prediction method of 0day attack path based on cyber defense knowledge graph was proposed.The cyber defense knowledge graph was constructed to refine the discrete security data such as threat, vulnerability and asset into the complete and high-related knowledge format by extracting concepts and entities related to network attack from cyber security ontology research finds and databases.Based on the knowledge integrated by the knowledge graph, assumed and restricted the unknown attributes such as the existence, availability and harmfulness of 0day vulnerabilities, and model the concept of "attack" as a relationship between attacker entities and device entities in the knowledge graph to transform the attack prediction to the link prediction of knowledge graph.According to this, apply path ranking algorithm was applied to mine the potential 0day attack in the target system and construct the 0day attack graph.Predicted the 0day attack path by utilizing the scores output by classifiers as the occurrence probabilities of single step attack and computing the occurrence probabilities of different attack paths.The experimental result shows that with the help of complete knowledge system provided by knowledge graph, the proposed method can reduce the dependence of prediction analysis on expert model and overcome the bad influence of 0day vulnerability to improve the accuracy of 0day attack prediction.And utilizing the characteristic that path ranking algorithm reasons based on the structure of graph can also help to backtrack the reasons of predicting results so as to improve the explainability of predicting.…”
    Get full text
    Article
  13. 4953

    AccFIT-IDS: accuracy-based feature inclusion technique for intrusion detection system by C. Rajathi, P. Rukmani

    Published 2025-12-01
    “…In today’s digital landscape, maintaining security has become increasingly difficult. Many organizations implement security mechanisms to protect their valuable resources from potential threats. …”
    Get full text
    Article
  14. 4954

    Design of Liquified Petroleum Gas (LPG) Leak Detection Tool with Buzazer nd Telegram based on IOT by Siti Maisarah Maisarah, Samsudin Samsudin, Muhammad Jibril, Dwi Yuli Prasetyo, Zulrahmadi Zulrahmadi

    Published 2024-11-01
    “…The development of Internet of Things (IoT) technology has made a major contribution to increasing efficiency and security in various fields. One of the growing applications is the use of IoT in gas leak detection to maintain a safe environment. …”
    Get full text
    Article
  15. 4955

    Association between Cardiac Hypertrophy and Sex of Patients from a Hospital in Ecuador by Guido Nino Guida Acevedo, María Fernanda Cueva Moncayo, Piedad Elizabeth Acurio Padilla

    Published 2024-01-01
    “…<br /><strong>Objective:</strong> determine the association between cardiac hypertrophy and sex of patients in a hospital of the Ecuadorian Institute of Social Security. <br /><strong>Methods:</strong> a descriptive and cross-sectional study was carried out in December 2022 in a hospital of the Ecuadorian Social Security Institute. 88 patients were analyzed distributed into two groups: male and female, each with 44 patients. …”
    Get full text
    Article
  16. 4956
  17. 4957
  18. 4958

    Protecting Florida Panthers by Protecting Domestic Animals: Building a "Panther-Proof" Pen by Phillip D. Rodgers, Elizabeth F. Pienaar, Mark Lotz, Darrell Land

    Published 2016-11-01
    “…To maintain support for panther conservation, it is paramount that rural residents protect and secure their pets and livestock. This 3-page fact sheet explains how to make a locking, secure enclosure to protect livestock from panther predation—and protect the fragile panther, as well. …”
    Get full text
    Article
  19. 4959

    Transformation in European Defence Supply Chains as Ukraine Conflict Fuels Demand by Roland Hellberg, Martin Lundmark

    Published 2025-01-01
    “…This study contributes to a deeper understanding and theoretical advancement in managing military and security challenges, with particular emphasis on enhancing readiness, resilience, and the scaling of military capabilities across cross-border defence supply chains.…”
    Get full text
    Article
  20. 4960