Showing 5,121 - 5,140 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 5121

    Survey of research on future network architectures by Tao HUANG, Jiang LIU, Ru HUO, Liang WEI, Yun-jie LIU

    Published 2014-08-01
    “…Nowadays, the Internet is facing unprecedented challenges, including scalability, security, management, mobil-ity, content distribution capability, and energy saving, etc., which are difficult to solve through incremental development. …”
    Get full text
    Article
  2. 5122

    Ciphertext policy attribute-based encryption scheme supporting direct revocation by Xi-xi YAN, Hui MENG

    Published 2016-05-01
    “…In order to support fine-grained attribute revocation in direct revocation mode an attribute-based encryption scheme with efficient revocation was proposed.The model of ABE supporting attribute revocation was given,and a con-crete scheme was constructed which was proven its security under the standard model.Compared to the existing related schemes,the size of ciphertext and private/secret key was reduced.In additional,the new scheme achieved fine-grained and immediate attribute revocation which is more suitable for the practical applications.…”
    Get full text
    Article
  3. 5123

    Key technologies and new challenges on body area networks by Xiaolin FANG, Junzhou LUO

    Published 2018-03-01
    “…As the rapid development of sensing,low-power integrated circuit and wireless communication techniques,body area network becomes a new technology to monitor human health,which provides a new solution for information medical treatment.The key technologies of body area network was firstly introduced,including energy consumption,data transmission,security and privacy and human health data processing.Finally,a series of new challenges in body area network systems was proposed.…”
    Get full text
    Article
  4. 5124

    Overview of the detection and prevention study of hardware Trojans by Qiang XU, Xing-hao JIANG, Li-hong YAO, Zhi-qiang ZHANG, Cheng ZHANG

    Published 2017-04-01
    “…The design and manufacture of integrated circuit chips are now a key component of the electronic industry.The increasing popularity of third-party technology services may lead to the implantation of hardware chips in the manufacturing process,which brings great challenge to the security of electronic devices.After introducing the concept of hardware Trojans,the characteristics and its forms were briefly analyzed.Then the detection technologies,and the prevention strategies of the hardware Trojans were discussed.At last,the development trend of the hardware Trojans was summarized.…”
    Get full text
    Article
  5. 5125
  6. 5126

    Biocatalytic conversion of microalgal biomass to biodiesel: optimization of growth conditions and synthesis of CaO bionanocatalyst from Monoraphidium sp. NCIM 5585 by Supriya Pandey, Thivaharan Varadavenkatesan, Raja Selvaraj, Ramesh Vinayagam

    Published 2025-02-01
    “…Abstract Microalgal feedstock is a potential source for biodiesel production that addresses the challenges of fuel security and sustainable agriculture. This study aims to maximize biomass yield and lipid accumulation for freshwater microalga Monoraphidium sp. …”
    Get full text
    Article
  7. 5127

    Forensic Pathology of Society-Oriented Expert Identification Institutions in China: A Retrospective Study by 11-year Data from Academy of Forensic Science by Yuan-Yuan Liu, En-Hao Fu, Ya-Wen Liu, Dong-Hua Zou, Jiang Huang, Hao-Jie Qin, Ning-Guo Liu

    Published 2024-12-01
    “…Conclusion: The Academy of Forensic Science and other social-service-oriented identification organizations undertake identification work on cases commissioned to them by the local and local people’s public security, people’s procuratorates, and people’s court systems. …”
    Get full text
    Article
  8. 5128

    AI-Based Holistic Framework for Cyber Threat Intelligence Management by Arnolnt Spyros, Ilias Koritsas, Angelos Papoutsis, Panos Panagiotou, Despoina Chatzakou, Dimitrios Kavallieros, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris

    Published 2025-01-01
    “…CTI continuously provides up-to-date information which enables the design and implementation of better security measures and mitigation strategies. Organisations gather data from different sources either internal or external to the organisation, which are analysed, resulting in CTI. …”
    Get full text
    Article
  9. 5129

    Intrusion detection using synaptic intelligent convolutional neural networks for dynamic Internet of Things environments by Hui Chen, Zhendong Wang, Shuxin Yang, Xiao Luo, Daojing He, Sammy Chan

    Published 2025-01-01
    “…The swift proliferation of IoT devices has brought about a multitude of complex cyberattacks that breach network security and compromise user privacy. To address these threats, this paper proposes a synaptic intelligent convolutional neural network (SICNN) model for intrusion detection in dynamic IoT environments. …”
    Get full text
    Article
  10. 5130
  11. 5131

    Patterned Lead‐Free Double Perovskite/Polymer Fluorescent Piezoelectric Composite Films for Advanced Anti‐Counterfeiting by Jindou Shi, Zeyu Wang, Nanxiang Jia, Minqiang Wang, Youlong Xu, Xiangming Li, Jinyou Shao

    Published 2025-01-01
    “…Traditional optical anti‐counterfeiting encryption techniques, which rely on light sources with varying wavelengths to identify information, are now insufficient to meet contemporary security demands due to their restricted response to a narrow range of wavelengths. …”
    Get full text
    Article
  12. 5132

    Investigating the blockchain technologies influences on the performance of road freight transportation management systems using network analysis technique by Ahmad Negravi, Omid Titidezh

    Published 2023-09-01
    “…The transparency technology has influenced time and trust and security by 22.63% and 77.37%, respectively, and smart contracts affected the two above waste categories by 88.81% and 11.19%, respectively. …”
    Get full text
    Article
  13. 5133

    The Subjective Vitality of Female Students: The Role of Attachment Styles and Alienation from Parents with the Mediation of Basic Psychological Needs by parvaneh alaie, Ladan Vaghef, fatemeh Nadimi

    Published 2024-11-01
    “…A positive relationship was found between secure style and basic psychological needs with the Subjective vitality of female students; this relationship between avoidant and ambivalent styles and alienation from parents was negative (P < 0.01). …”
    Get full text
    Article
  14. 5134

    Supporting and hindering environments for participation of adolescents diagnosed with autism spectrum disorder: A scoping review. by Beate Krieger, Barbara Piškur, Christina Schulze, Uta Jakobs, Anna Beurskens, Albine Moser

    Published 2018-01-01
    “…Two main themes were found: "providing security" indicates how the environment, and specifically the parental, physical, and informational environments, have a securing or intimidating effect. …”
    Get full text
    Article
  15. 5135

    Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks by Abdinasir Hirsi, Mohammed A. Alhartomi, Lukman Audah, Adeb Salh, Nan Mad Sahar, Salman Ahmed, Godwin Okon Ansa, Abdullahi Farah

    Published 2025-01-01
    “…However, these benefits introduce security vulnerabilities, particularly from Distributed Denial-of-Service (DDoS) attacks, which represent some of the most disruptive threats to SDN environments. …”
    Get full text
    Article
  16. 5136

    Revolutionizing User Authentication Exploiting Explainable AI and CTGAN-Based Keystroke Dynamics by Hussien Abdel Raouf, Mostafa M. Fouda, Mohamed I. Ibrahem

    Published 2025-01-01
    “…Due to the reliability and efficiency of keystroke dynamics, enterprises have adopted it widely in multi-factor authentication systems, effectively strengthening user authentication and thereby boosting the security of online and offline services. The existing works that detect imposter users suffer from performance and robustness degradation. …”
    Get full text
    Article
  17. 5137

    Spatial decision-making model for priority development of Indonesia coast guard stations by Novianto Hary Adiatmaja, Winnie Septiani, Triwulandari Satitidjati Dewayana, Martino Luis

    Published 2025-01-01
    “…Indonesia Coast Guard (IDNCG) is a paramilitary agency in charge of security and safety patrols in Indonesian maritime waters. …”
    Get full text
    Article
  18. 5138

    Ethnobotanical study of wild edible plants in Metema and Quara districts, Northwestern Ethiopia by Daniel Tadesse, Getinet Masresha, Ermias Lulekal, Asmamaw Alemu

    Published 2025-02-01
    “…Abstract Background Wild edible plants (WEPs) are vital to enhance food security and generate income. Despite Ethiopia’s vast area and cultural diversity, there remains a need for further investigation of WEPs. …”
    Get full text
    Article
  19. 5139

    FARMING SYSTEM ADAPTATION TO CLIMATE CHANGE IN ALGERIA: CHALLENGES AND STRATEGIES by Belguet Assia, Bouchareb Radia, Chafia Benider, Guendouz Ali

    Published 2024-11-01
    “…By building resilience at the farm level and enhancing adaptive capacity, Algeria aims to safeguard its agricultural sector and ensure food security for future generations…”
    Get full text
    Article
  20. 5140

    Application of analytical hierarchical process in assessing the suitability of land for growing grain crops by Olsid Mema, Etleva Jojic, Perparim Laze, Mykyta Khramov, Oleksandr Lymar

    Published 2024-12-01
    “…Assessing the suitability of land for growing grain crops is a relevant issue for ensuring sustainable agricultural production and improving food security. The Analytical Hierarchy Process (AHP) is an effective method of multi-criteria evaluation that systematically addresses all parameters. …”
    Get full text
    Article