Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5041
Gyroscope-Based Smartphone Model Identification via WaveNet and EfficientNetV2 Ensemble
Published 2024-01-01“…Smartphone model detection through sensor data is important for enhancing security protocols, preventing device fraud, and ensuring authorized service access. …”
Get full text
Article -
5042
The ethics of artificial intelligence use in university libraries in Zimbabwe
Published 2025-01-01“…They are also prepared to offer training on how to protect intellectual property but have serious challenges in issues of transparency, data security, plagiarism detection and concerns about job losses. …”
Get full text
Article -
5043
EPPTA: Efficient partially observable reinforcement learning agent for penetration testing applications
Published 2025-01-01“…Abstract In recent years, penetration testing (pen‐testing) has emerged as a crucial process for evaluating the security level of network infrastructures by simulating real‐world cyber‐attacks. …”
Get full text
Article -
5044
-
5045
A Multi-Signature Scheme for Defending Malleability Attack on DeFi
Published 2025-01-01“…Signatures are crucial in blockchain-based Decentralised Finance (DeFi) protocols because they ensure the security and integrity of transactions and smart contracts. …”
Get full text
Article -
5046
-
5047
Levels Politechnic Community Satisfaction to The Use of Lebuhraya Pantai Timur 2
Published 2018-11-01“…Results of this analysis showed a mean value for items 'security level' in LPT2 is 2.29, i.e. at low mean score. …”
Get full text
Article -
5048
Examination and the State of Intoxication: Features of Legal Regulation and Observance of Human Rights and Freedoms
Published 2020-06-01“…In other circumstances, such an examination of intoxication should be considered inadmissible evidence in an administrative offense case, since it was obtained in substantial violation of human rights and freedoms, including the right to liberty and security, as well as a number of other rights, which the detained person failed to exercise. …”
Get full text
Article -
5049
The Importance of the Structure and Content Analysis of the Exit Interview in Companies for the Success of its Implementation
Published 2024-07-01“…The exit interview is a valuable tool for companies through which they can learn valuable information related to work processes, along with information’s about employees and the reasons for leaving the company, as well as potential or real security and reputational threats (outflows of business secrets, bad business practices, etc.) that companies may suffer or suffer damage. …”
Get full text
Article -
5050
Violent crime motivated by war-related hate: concepts, signs, development trends
Published 2023-12-01“…Attention is focused on the fact that manifestations of violence and aggression in society pose a real threat to the stability of the existence of the entire human civilization, which carries potential threats to the national security of Ukraine, as well as to regional and global security. …”
Get full text
Article -
5051
-
5052
Simultaneous Presentation of a Right Littre’s Hernia and a Left Amyand’s Hernia in a School-Aged Patient
Published 2019-01-01Get full text
Article -
5053
Dialogue as a tool of nutrition literacy in an agricultural intervention programme in Odisha, India
Published 2022-05-01“…Results The methodology of dialogue as a pedagogic tool generated a discussion about food security among the community. CHFs identified key messages and shared them with fellow villagers in imaginative ways. …”
Get full text
Article -
5054
Quarantine and anti-epidemic measures as an element of Emergency Law in Ukraine
Published 2023-10-01“…The development and improvement of quarantine and anti-epidemic measures in the system of Emergency Law is crucial for ensuring the security and resilience of society. Sustained changes in global threats, such as pandemics, require constant analysis, updating and improvement of the legal response mechanism. …”
Get full text
Article -
5055
Java deserialization vulnerability defense technologybased on run-time detection
Published 2024-04-01“…Consequently, developing strategies to counter Java deserialization vulnerability attacks has become a critical aspect of network security. Following an examination of numerous publicly known Java deserialization vulnerabilities, a runtime detection-based defense technology solution for Java deserialization vulnerabilities was proposed. …”
Get full text
Article -
5056
Blockchain based adaptive federated learning in computational power network
Published 2024-06-01“…Finally, the integration of blockchain technology strengthened the security mechanism, effectively preventing poisoning attacks and inference attacks. …”
Get full text
Article -
5057
Modeling the Internet of Things network for monitoring audio information on the Amazon platform
Published 2021-08-01“…The algorithm for connecting devices to the AWS platform is given: creating a device certificate on the platform, creating a security policy, rules for processing information received from devices, and testing the network. …”
Get full text
Article -
5058
Block level cloud data deduplication scheme based on attribute encryption
Published 2023-10-01“…Due to the existing cloud data deduplication schemes mainly focus on file-level deduplication.A scheme was proposed, based on attribute encryption, to support data block-level weight removal.Double granularity weight removal was performed for both file-level and data block-level, and data sharing was achieved through attribute encryption.The algorithm was designed on the hybrid cloud architecture Repeatability detection and consistency detection were conducted by the private cloud based on file labels and data block labels.A Merkle tree was established based on block-level labels to support user ownership proof.When a user uploaded the cipher text, the private cloud utilized linear secret sharing technology to add access structures and auxiliary information to the cipher text.It also updated the overall cipher text information for new users with permissions.The private cloud served as a proxy for re-encryption and proxy decryption, undertaking most of the calculation when the plaintext cannot be obtained, thereby reducing the computing overhead for users.The processed cipher text and labels were stored in the public cloud and accessed by the private cloud.Security analysis shows that the proposed scheme can achieve PRV-CDA (Privacy Choose-distribution attacks) security in the private cloud.In the simulation experiment, four types of elliptic curve encryption were used to test the calculation time for key generation, encryption, and decryption respectively, for different attribute numbers with a fixed block size, and different block sizes with a fixed attribute number.The results align with the characteristics of linear secret sharing.Simulation experiments and cost analysis demonstrate that the proposed scheme can enhance the efficiency of weight removal and save time costs.…”
Get full text
Article -
5059
Baltic States in NATO: Results of the Decade
Published 2014-12-01“…This satisfies demands of the political elites and victimized public consciousness for more security, makes it possible for elites to consider their states as bulwark against Russia. …”
Get full text
Article -
5060
Use of Extra-judicial Technical Surveillance in Criminal Decision-making: European Limitations and National Challenges
Published 2024-12-01“…The case law of the European Court of Human Rights in Strasbourg has consistently stated that even a severe threat to national security, such as acts of terrorism, or other risks of a global nature are not to be relied upon in order to override this form of protection and control. …”
Get full text
Article