Showing 5,041 - 5,060 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 5041

    Gyroscope-Based Smartphone Model Identification via WaveNet and EfficientNetV2 Ensemble by Erkan Kiymik, Ali Emre Ozturk

    Published 2024-01-01
    “…Smartphone model detection through sensor data is important for enhancing security protocols, preventing device fraud, and ensuring authorized service access. …”
    Get full text
    Article
  2. 5042

    The ethics of artificial intelligence use in university libraries in Zimbabwe by Stephen Tsekea, Edward Mandoga

    Published 2025-01-01
    “…They are also prepared to offer training on how to protect intellectual property but have serious challenges in issues of transparency, data security, plagiarism detection and concerns about job losses. …”
    Get full text
    Article
  3. 5043

    EPPTA: Efficient partially observable reinforcement learning agent for penetration testing applications by Zegang Li, Qian Zhang, Guangwen Yang

    Published 2025-01-01
    “…Abstract In recent years, penetration testing (pen‐testing) has emerged as a crucial process for evaluating the security level of network infrastructures by simulating real‐world cyber‐attacks. …”
    Get full text
    Article
  4. 5044
  5. 5045

    A Multi-Signature Scheme for Defending Malleability Attack on DeFi by Chen Zhang, Wenyu Liao, Xiaobin Liu, Huanrong Wu, Mohammed J. F. Alenazi

    Published 2025-01-01
    “…Signatures are crucial in blockchain-based Decentralised Finance (DeFi) protocols because they ensure the security and integrity of transactions and smart contracts. …”
    Get full text
    Article
  6. 5046
  7. 5047

    Levels Politechnic Community Satisfaction to The Use of Lebuhraya Pantai Timur 2 by Rosmida binti Ab Ghani, Najah binti Mohd Nawi, Norhafiza binti Idris

    Published 2018-11-01
    “…Results of this analysis showed a mean value for items 'security level' in LPT2 is 2.29, i.e. at low mean score. …”
    Get full text
    Article
  8. 5048

    Examination and the State of Intoxication: Features of Legal Regulation and Observance of Human Rights and Freedoms by M. A. Sambor

    Published 2020-06-01
    “…In other circumstances, such an examination of intoxication should be considered inadmissible evidence in an administrative offense case, since it was obtained in substantial violation of human rights and freedoms, including the right to liberty and security, as well as a number of other rights, which the detained person failed to exercise. …”
    Get full text
    Article
  9. 5049

    The Importance of the Structure and Content Analysis of the Exit Interview in Companies for the Success of its Implementation by Lana Milivojević

    Published 2024-07-01
    “…The exit interview is a valuable tool for companies through which they can learn valuable information related to work processes, along with information’s about employees and the reasons for leaving the company, as well as potential or real security and reputational threats (outflows of business secrets, bad business practices, etc.) that companies may suffer or suffer damage. …”
    Get full text
    Article
  10. 5050

    Violent crime motivated by war-related hate: concepts, signs, development trends by V. V. Sokurenko

    Published 2023-12-01
    “…Attention is focused on the fact that manifestations of violence and aggression in society pose a real threat to the stability of the existence of the entire human civilization, which carries potential threats to the national security of Ukraine, as well as to regional and global security. …”
    Get full text
    Article
  11. 5051
  12. 5052
  13. 5053

    Dialogue as a tool of nutrition literacy in an agricultural intervention programme in Odisha, India by Rama Narayanan, Akshaya Kumar Panda, D. J. Nithya, R. V. Bhavani

    Published 2022-05-01
    “…Results The methodology of dialogue as a pedagogic tool generated a discussion about food security among the community. CHFs identified key messages and shared them with fellow villagers in imaginative ways. …”
    Get full text
    Article
  14. 5054

    Quarantine and anti-epidemic measures as an element of Emergency Law in Ukraine by O. O. Levytskyi

    Published 2023-10-01
    “…The development and improvement of quarantine and anti-epidemic measures in the system of Emergency Law is crucial for ensuring the security and resilience of society. Sustained changes in global threats, such as pandemics, require constant analysis, updating and improvement of the legal response mechanism. …”
    Get full text
    Article
  15. 5055

    Java deserialization vulnerability defense technologybased on run-time detection by LI Yulin, CHEN Libo, LIU Yujiang, DU Wenlong, XUE Zhi

    Published 2024-04-01
    “…Consequently, developing strategies to counter Java deserialization vulnerability attacks has become a critical aspect of network security. Following an examination of numerous publicly known Java deserialization vulnerabilities, a runtime detection-based defense technology solution for Java deserialization vulnerabilities was proposed. …”
    Get full text
    Article
  16. 5056

    Blockchain based adaptive federated learning in computational power network by LIU Tianrui, WANG Lianhai, WANG Qizheng, XU Shujiang, ZHANG Shuhui, WANG Yingxiaochun

    Published 2024-06-01
    “…Finally, the integration of blockchain technology strengthened the security mechanism, effectively preventing poisoning attacks and inference attacks. …”
    Get full text
    Article
  17. 5057

    Modeling the Internet of Things network for monitoring audio information on the Amazon platform by U. A. Vishniakou, B. H. Shaya

    Published 2021-08-01
    “…The algorithm for connecting devices to the AWS platform is given: creating a device certificate on the platform, creating a security policy, rules for processing information received from devices, and testing the network. …”
    Get full text
    Article
  18. 5058

    Block level cloud data deduplication scheme based on attribute encryption by Wenting GE, Weihai LI, Nenghai YU

    Published 2023-10-01
    “…Due to the existing cloud data deduplication schemes mainly focus on file-level deduplication.A scheme was proposed, based on attribute encryption, to support data block-level weight removal.Double granularity weight removal was performed for both file-level and data block-level, and data sharing was achieved through attribute encryption.The algorithm was designed on the hybrid cloud architecture Repeatability detection and consistency detection were conducted by the private cloud based on file labels and data block labels.A Merkle tree was established based on block-level labels to support user ownership proof.When a user uploaded the cipher text, the private cloud utilized linear secret sharing technology to add access structures and auxiliary information to the cipher text.It also updated the overall cipher text information for new users with permissions.The private cloud served as a proxy for re-encryption and proxy decryption, undertaking most of the calculation when the plaintext cannot be obtained, thereby reducing the computing overhead for users.The processed cipher text and labels were stored in the public cloud and accessed by the private cloud.Security analysis shows that the proposed scheme can achieve PRV-CDA (Privacy Choose-distribution attacks) security in the private cloud.In the simulation experiment, four types of elliptic curve encryption were used to test the calculation time for key generation, encryption, and decryption respectively, for different attribute numbers with a fixed block size, and different block sizes with a fixed attribute number.The results align with the characteristics of linear secret sharing.Simulation experiments and cost analysis demonstrate that the proposed scheme can enhance the efficiency of weight removal and save time costs.…”
    Get full text
    Article
  19. 5059

    Baltic States in NATO: Results of the Decade by V. V. Vorotnikov

    Published 2014-12-01
    “…This satisfies demands of the political elites and victimized public consciousness for more security, makes it possible for elites to consider their states as bulwark against Russia. …”
    Get full text
    Article
  20. 5060

    Use of Extra-judicial Technical Surveillance in Criminal Decision-making: European Limitations and National Challenges by Andrei Zarafiu

    Published 2024-12-01
    “…The case law of the European Court of Human Rights in Strasbourg has consistently stated that even a severe threat to national security, such as acts of terrorism, or other risks of a global nature are not to be relied upon in order to override this form of protection and control. …”
    Get full text
    Article