Showing 4,961 - 4,980 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 4961

    Efficient data possession–checking protocol with deduplication in cloud by Jinxia Wei, Xinxin Niu, Ru Zhang, Jianyi Liu, Yuangang Yao

    Published 2017-08-01
    “…Data integrity verification with deduplication can not only save space of the cloud server but also ensure security of the stored data. In the existing integrity verification scheme, deduplications are implemented by the cloud server. …”
    Get full text
    Article
  2. 4962

    EVOLUȚIA TRAFICULUI DE DROGURI DE MARE RISC DIN ROMÂNIA, ÎN PERIOADA 2016 – 2022 by Adrian Laurențiu PANĂ

    Published 2023-01-01
    “…High-risk drug trafficking is a growing threat to Romania's national security. Organized crime has been exceedingly resilient to anti-drug policies. …”
    Get full text
    Article
  3. 4963

    Virtual Simulation Design Facing Smart Payment Screen on the Background of Artificial Intelligence by Yan Li, Xiao Wang

    Published 2022-01-01
    “…The design of the smart payment screen makes the user’s payment more secure, and the payment risk is greatly reduced.…”
    Get full text
    Article
  4. 4964

    Digitization and Preservation of Academic Records: A case Study of Kabale University Registry. by Ainanani, Catherine

    Published 2024
    “…The study also identified several threats to these records, such as inadequate data security measures, insufficient storage space, cybersecurity threats, poor maintenance of digitization equipment, technological obsolescence, and potential disasters. …”
    Get full text
    Thesis
  5. 4965

    BCSE: Blockchain-Based Trusted Service Evaluation Model over Big Data by Fengyin Li, Xinying Yu, Rui Ge, Yanli Wang, Yang Cui, Huiyu Zhou

    Published 2022-03-01
    “…The registration and authentication records of users’ identity and the reviews for service vendors are all stored in the blockchain network. The security analysis shows that this model can ensure the credibility of users’ reviews for service vendors, and other users can obtain credible reviews of service vendors via the review publicity module. …”
    Get full text
    Article
  6. 4966

    The Role of Artificial Intelligence in Aviation Construction Projects in the United Arab Emirates: Insights from Construction Professionals by Mariam Abdalla Alketbi, Fikri Dweiri, Doraid Dalalah

    Published 2024-12-01
    “…Despite the UAE’s leadership in AI-driven security advancements, its use in aviation construction is still underdeveloped. …”
    Get full text
    Article
  7. 4967

    XI2S-IDS: An Explainable Intelligent 2-Stage Intrusion Detection System by Maiada M. Mahmoud, Yasser Omar Youssef, Ayman A. Abdel-Hamid

    Published 2025-01-01
    “…By leveraging SHAP values, XI2S-IDS enhances transparency in decision-making, allowing security analysts to gain clear insights into feature importance and the model’s rationale. …”
    Get full text
    Article
  8. 4968

    STRATEGIC PRIORITIES FOR THE DEVELOPMENT OF THE RUSSIAN ARCTIC AND INSTRUMENTS FOR THEIR RESOURCE SUPPORT by Irina V. Novikova, Murad K. Alimuradov

    Published 2024-12-01
    “…The primary objective is to assess the potential resource security required to implement these priorities, utilizing the proposed methodological framework. …”
    Article
  9. 4969

    A Survey of Post-Quantum Cryptography Migration in Vehicles by Nils Lohmiller, Sabrina Kaniewski, Michael Menth, Tobias Heer

    Published 2025-01-01
    “…A promising solution to ensure the continued security attributes of confidentiality, integrity, and availability is the use of Post-Quantum Cryptography (PQC) algorithms. …”
    Get full text
    Article
  10. 4970

    Cooperative Behaviors and Multienergy Coupling Through Distributed Energy Storage in the Peer-to-Peer Market Mechanism by Zeynep Tanis, Ali Durusu

    Published 2025-01-01
    “…A consortium blockchain-based framework ensures secure and private registration. A peer-to-peer network facilitates multienergy trading, enabling efficient energy generation and storage. …”
    Get full text
    Article
  11. 4971

    Flexibility matters: Impact assessment of small and medium enterprises flexibility on the German energy transition by Anas Abuzayed, Mario Liebensteiner, Niklas Hartmann

    Published 2025-01-01
    “…By 2045, wind power becomes vital for supply security and is operated as a dispatchable ramping-up technology. …”
    Get full text
    Article
  12. 4972

    Convergence of Blockchain, IoT, and AI for Enhanced Traceability Systems: A Comprehensive Review by Yahaya Saidu, Shuhaida Mohamed Shuhidan, Dahiru Adamu Aliyu, Izzatdin Abdul Aziz, Shamsuddeen Adamu

    Published 2025-01-01
    “…Key trends include AI-driven analytics, real-time IoT data collection, and the need for secure, tamper-proof data by BC. However, interoperability, scalability, and standardization challenges hinder adoption. …”
    Get full text
    Article
  13. 4973

    AFD and chaotic map‐based integrated approach for ECG compression, steganography and encryption in E‐healthcare paradigm by Neetika Soni, Indu Saini, Butta Singh

    Published 2021-07-01
    “…Later, chaotic map‐based steganography and encryption are proposed on the AFD coefficients to secure the confidential information and the signal itself. …”
    Get full text
    Article
  14. 4974

    Experimental demonstration of 8190-km long-haul semiconductor-laser chaos synchronization induced by digital optical communication signal by Anbang Wang, Junli Wang, Lin Jiang, Longsheng Wang, Yuncai Wang, Lianshan Yan, Yuwen Qin

    Published 2025-01-01
    “…Abstract Common-signal-induced synchronization of semiconductor lasers have promising applications in physical-layer secure transmission with high speed and compatibility with the current fiber communication. …”
    Get full text
    Article
  15. 4975
  16. 4976

    A Hybrid Approach for Color Face Recognition Based on Image Quality Using Multiple Color Spaces by Mahdi Hosseinzadeh, Mohammad Mehdi Pazouki, Önsen Toygar

    Published 2024-12-01
    “…The proposed method showcases the potential for more reliable and secure recognition systems.…”
    Get full text
    Article
  17. 4977

    An Enhanced LSTM Approach for Detecting IoT-Based DDoS Attacks Using Honeypot Data by Arjun Kumar Bose Arnob, M. F. Mridha, Mejdl Safran, Md Amiruzzaman, Md. Rajibul Islam

    Published 2025-02-01
    “…Abstract One of the widening perils in network security is the Distributed Denial of Service (DDoS) attacks on the Internet of Things (IoT) ecosystem. …”
    Get full text
    Article
  18. 4978

    Anomaly detection of adversarial cyber attacks on electric vehicle charging stations by Sagar Babu Mitikiri, Vedantham Lakshmi Srinivas, Mayukha Pal

    Published 2025-03-01
    “…Intruders pose potential risks to the security, reliability, and functionality of the EVCI, by spoofing the data through these charging ports leading to anomalies in the data. …”
    Get full text
    Article
  19. 4979

    Analysis and prediction of urban agglomeration ecological footprint based on improved three-dimensional ecological footprint and shared socioeconomic pathways by Ruirui Jiang, Liangjun Fei, Shouxuan Kang

    Published 2025-01-01
    “…This study analyzes the spatial–temporal dynamics of ecological security, sustainability, and driving factors in Shaanxi’s Guanzhong urban agglomeration. …”
    Get full text
    Article
  20. 4980

    Explaining the chronopolitical pattern of relations between Iran and Iraq by masoud malekian dolat abadi, gholamhosein heidari, farhad hamzeh

    Published 2025-06-01
    “…For instance, Iraq is actively engaged in the "FAW Corridor" initiative, whereas Iran seeks to expand economic cooperation and secure a place in the burgeoning alliances of the East. …”
    Get full text
    Article