Showing 5,001 - 5,020 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 5001

    Advanced Measuring (Instrumentation) Methods for Nuclear Installations: A Review by Wang Qiu-kuan, Lin Chang-hua, Yang Yan

    Published 2012-01-01
    “…The research of measurement in nuclear installations involves many aspects, such as nuclear reactors, nuclear fuel cycle, safety and security, nuclear accident, after action, analysis, and environmental applications. …”
    Get full text
    Article
  2. 5002

    STRUCTURE AND CONTENT OF PRODUCTION ANALYSIS IN RETAIL CHAINS by A. Dvoryankina, T. Rogulenko

    Published 2017-09-01
    “…The issues of analysis in the enterprise security system are touched.…”
    Get full text
    Article
  3. 5003

    Du métro à la rue, de la désobéissance civile à la ‘Primera Línea’ : l’explosion sociale au Chili en octobre 2019 by Nathalie Jammet-Arias

    Published 2024-04-01
    “…The purpose of this article is to study this unprecedented social mobilization since the end of the dictatorship through the relations between the power and the demonstrators thanks to the analysis of the reactions of the government, the collaborations between the different groups, symbols used in the practices of resistance to power and to the security forces of the State and of the collective constituted by the « Front line ». …”
    Get full text
    Article
  4. 5004

    Tropical Foliage Plant Development: Breeding Techniques for Aglaonema and Dieffenbachia by Richard J. Henny, Jianjun Chen, Terri A. Mellich

    Published 2009-06-01
    “…Mellich, describes the techniques plant breeders can use for controlling flowering, effecting pollination, and securing seed production. Includes references. Published by the UF Department of Environmental Horticulture, May 2009. …”
    Get full text
    Article
  5. 5005

    Direct anonymous authentication scheme for wireless networks under trusted computing by YANG Li1, MA Jian-feng 1, PEI Qing-qi2, MA Zhuo 1

    Published 2010-01-01
    “…Based on direct anonymous attestation of trusted computing,a wireless anonymous authentication scheme was proposed,the platform of the mobile node was verified by the foreign network agent and the identity of the mobile node user was authenticated by the home network agent and the foreign network agent together.By using of temporary identi-ties and one time secret keys,identity anonymity and domain separation property are achieved.The analysis shows that the scheme is secure,reliable,and with higher performance.…”
    Get full text
    Article
  6. 5006

    IMPLEMENTATION OF PUBLIC-PRIVATE PARTNER-SHIP PROJECTS IN THE RUSSIAN ARCTIC by O. Bolshakova, V. Volkova, A. Surnova

    Published 2018-06-01
    “…The importance of this task is determined by the fact that the reserves of natural resources located in the Arctic should provide the basis for the energy and economic security of the country. The comparative analysis of ways of realization of infrastructure projects on the basis of the state order and public - private partnership is carried out. …”
    Get full text
    Article
  7. 5007

    THE COMINFORM EMIGRATION IN BULGARIA by Milan Milenković

    Published 2025-02-01
    “…Research is mostly based on unpublished sources from the State Security Service (UDB) that are kept in the State Archives of Serbia, and also on relevant literature.…”
    Get full text
    Article
  8. 5008

    Evaluation of mimic defense strategy based on M-FlipIt game model by Shaohu DING, Ning QI, Yiwei GUO

    Published 2020-07-01
    “…To make up for the lack of security performance evaluation of the mimic defense systems in the advanced persistent threat scenarios an improved game model based on the FlipIt game theory model was proposed.The dynamic strategy of mimic defense under different heterogeneity conditions was evaluated,and a case study for the simulation analysis was conducted.The simulation results show that the rotation of indefinite period can make up for the lack of heterogeneity and maintain the higher game payoff of defenders.…”
    Get full text
    Article
  9. 5009

    Novel mobile agent dynamic data integrity protection protocol by LI Peng-fei1, QING Si-han2, MA Heng-tai1, DENG Yong1

    Published 2007-01-01
    “…Integrity characteristics of dynamic data was redefined and classified by attacker capability,and then it was analyzed how to protect truncation attack with collusion.After that,a data protection protocol of free-roaming agent was presented.The protocol used a reverse chained signature to protect the integrity of roaming path,and protected the dy-namic data integrity based on this.Specially,the protocol provided truncation resilience in collusion condition,and its secure property was proved by formal method.…”
    Get full text
    Article
  10. 5010

    RISK FACTORS IDENTIFICATION FOR AGGRESSIVE BEHAVIOR AND PROTECTIVE RESOURCES OF MINORS IN THE MANAGERIAL-SUPERVISORY MODEL OF THE COURT TUTORAGE IN POLAND by Andrzej Węgliński

    Published 2024-12-01
    “…The classification of minors into risk groups is aimed at improving the efficiency of the work of family probation officers and increasing the sense of security in society.…”
    Get full text
    Article
  11. 5011

    Survey on anonymous authentication mechanisms of VANET by Tian-han GAO, Yan-qiang LI

    Published 2016-08-01
    “…VANET has an attractive prospect,it faces serious security issues but at the same time.Access authentica-tion and privacy protection will play important roles to address the issues.A detailed survey on the literature anonymous authentication mechanisms of VANET in terms of their implementation approaches were presented such as anonymous credential and digital signature.The advantages and disadvantages of each mechanism were elabo-rated and the novel research directions were also given with the help of analysis.…”
    Get full text
    Article
  12. 5012

    Trusted routing based on D-S evidence theory in wireless mesh network by YANG Kai, MA Jian-feng, YANG Chao

    Published 2011-01-01
    “…Combined with Dempster-Shafer(D-S) evidence theory,a trust evaluation model was given,meanwhile,a trusted routing——T-AODV was also proposed which built trusted routings according to the trustworthiness of nodes calculated by the proposed trust evaluation model.Simulation results show that the proposed scheme can detect and isolate malicious nodes efficiently and resist attacks to some extent and improve the reliability,robustness and security of the over all network effectively.…”
    Get full text
    Article
  13. 5013

    Digitalization of national economy by L. P. Goncharenko, S. A. Sybachin

    Published 2019-09-01
    “…The gradual transition to a digital model of development will increase the competitiveness of Russian products on international markets and it will also contribute to the improvement of national security. Analysis of the implementation of information and communication technologies in the national economy shows significant lag behind the leaders. …”
    Get full text
    Article
  14. 5014

    Tropical Foliage Plant Development: Breeding Techniques for Aglaonema and Dieffenbachia by Richard J. Henny, Jianjun Chen, Terri A. Mellich

    Published 2009-06-01
    “…Mellich, describes the techniques plant breeders can use for controlling flowering, effecting pollination, and securing seed production. Includes references. Published by the UF Department of Environmental Horticulture, May 2009. …”
    Get full text
    Article
  15. 5015
  16. 5016
  17. 5017
  18. 5018
  19. 5019

    Selling Safely: Cybersecurity Best Practices for Small, Rural Ag Businesses by Lauri M. Baker, Cheryl R. Boyer, Russell Boyer

    Published 2022-05-01
    “…Small businesses, like agricultural and rural businesses, should not think they are immune to this threat: obscurity is not security. This new 6-page publication of the UF/IFAS Department of Agricultural Education and Communication includes some cybersecurity best practices and links to resources for further education. …”
    Get full text
    Article
  20. 5020

    INFORMATION SUPPORT FOR THE TRANSPORT AND LOGISTICS COMPANY by T. Bogdanova, K. Kuznetsov

    Published 2016-04-01
    “…The analysis of the major databases characterizing the state of the external and internal environments of transport and logistics companies, which allowed to formulate the problems and trends of development of information security. Examples of public information databases and their impact on the performance of the transport and logistics companies. …”
    Get full text
    Article