Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5201
Subject matter of proof and peculiarities of collecting evidence in the investigation of crimes committed against the law enforcement officers
Published 2023-12-01“…The defence and security sector plays a significant role in ensuring the national security of the state, the vast majority of which are law enforcement agencies. …”
Get full text
Article -
5202
Research review of network defense decision-making methods based on attack and defense game
Published 2022-02-01“…Game theory studies the optimal decision-making problem under the condition of conflict confrontation.It is one of the basic theories of cyberspace security, and can provide a theoretical basis for solving the problem of network defense decision-making.The six game characteristics of network attack and defense were defined, such as goal opposition, strategy dependence, non-cooperative relationship, incomplete information, dynamic evolution and interest drive.Based on the hypothesis of rational player and limited resources, a 5-tuple network attack and defense game model was formally defined by using player, attack and defense strategy set, attack and defense action set, attack and defense information set and attack and defense income.The existing conditions of game equilibrium were analyzed, and the general process of network defense decision-making based on attack and defense game model was summarized.The applicable scenarios of network defense decision-making methods based on eight different types of game models were analyzed, such as complete information static game, complete information dynamic game, incomplete information static game, incomplete information dynamic game, evolutionary game, differential game, time game and random game, and summarizes their research ideas.The advantages and disadvantages of network defense decision-making methods based on different types of game models were given.The development process of network defense decision-making method based on attack defense game was summarized, and the advantages and characteristics of defense decision-making method was explained.It were pointed out that there were three problems in the research process, such as the relationship between the number of factors considered in game modeling and the complexity of the model, the dependence of game reasoning on information and data, and the generalization and migration of game model.It also looked forward to the next research direction from the description mechanism of normative strategy, the calculation method of optimizing revenue and the integration with other network security technologies.And the problems that should be solved were explained.…”
Get full text
Article -
5203
THE ANALYSIS OF THE KEY DRIVERS AND BARRIERS OF CLOUD MIGRATION IN COMPANIES IN BOSNIA AND HERZEGOVINA
Published 2020-05-01“…According to the research results, the most significant obstacles of cloud migration include the fo-llowing: lack of internal experts, privacy, lack of respo-nsibility of cloud providers in case of security incident, costs and complexity of migration to the cloud, etc. …”
Get full text
Article -
5204
Gender-Based Motivational Factors For Choosing Dentistry As A Career By First Year Dental Students Of College Of Pakistan
Published 2023-12-01“…Prominent motivating factors were flexible work patterns (63.5%), self-employment (63%), financial security (44.8%) and parents wish (25%). Conclusion: Students chose Dentistry not only due to their interests but also because of flexible work patterns, financial security and self-employment. …”
Get full text
Article -
5205
China’s peacekeeping activities within the UN: Features, challenges, and prospects
Published 2024-03-01“…Currently, among the permanent members of the UN Security Council, China is the largest supplier of contingents for UN peacekeeping operations and the second largest donor of financing for these operations. …”
Get full text
Article -
5206
Environmental impact assessment of Sadr Double - Deck Highways on the context of residential neighborhoods around
Published 2021-09-01“…In this regard, the ecological and skeleton have the most susceptibility and the security each have the least susceptibility from the Sadr multi-layer Sadr bridge and in rating the neighborhood, Rostamabad had the most susceptibility and the Zarhandeh has the least susceptibility from the Multi-layer Sadr bridge.…”
Get full text
Article -
5207
Adaptive selection method of desensitization algorithm based on privacy risk assessment
Published 2023-06-01“…The financial industry deals with a vast amount of sensitive data in its business operations.However, the conventional approach of binding financial data for desensitization and using desensitization algorithms is becoming inefficient due to the fast-paced growth of financial businesses and the proliferation of data types.Additionally, manual verification and assessment of desensitized data by security experts are time-consuming and may carry potential privacy risks due to the improper selection of desensitization algorithms.While prior research has emphasized desensitization methods and privacy-preserving technologies, limited work has been conducted on desensitization algorithms from the perspective of automation.To address this issue, an adaptive recommendation framework was propose for selecting desensitization strategies that consider various factors, such as existing privacy protection technologies, data quality requirements of business scenarios, security risk requirements of financial institutions, and data attributes.Specifically, a dual-objective evaluation function was established for privacy risk and data quality to optimize the selection of desensitization algorithm parameters for different algorithms.Furthermore, the desensitization algorithm and parameters were adaptively selected by considering the data attributes through a multi-decision factor system and desensitization effect evaluation system.Compared to traditional approaches, the proposed framework effectively tackle issues of reduced data usability and inadequate personal data privacy protection that derive from manual intervention.Testing on a dataset with multiple financial institution types, the experiments show that the proposed method achieves a recommendation accuracy exceeding 95%, while the desensitized privacy risk level differed by less than 10% from the expected level.Additionally, the recommendation efficiency is 100 times faster than expert manual processing.…”
Get full text
Article -
5208
Localization of multiple jamming attackers in vehicular ad hoc network
Published 2017-08-01Get full text
Article -
5209
Towards better and unlinkable protected biometric templates using label‐assisted discrete hashing
Published 2022-01-01“…Through the use of a moderately sized multimodal biometric database of 94 subjects, the effectiveness of the proposed approach is illustrated to achieve a robust and secure template protection with irreversibility, unlinkability and renewability. …”
Get full text
Article -
5210
Clustering Cu-S based compounds using periodic table representation and compositional Wasserstein distance
Published 2024-12-01Get full text
Article -
5211
Method on intrusion detection for industrial internet based on light gradient boosting machine
Published 2023-04-01“…Intrusion detection is a critical security protection technology in the industrial internet, and it plays a vital role in ensuring the security of the system.In order to meet the requirements of high accuracy and high real-time intrusion detection in industrial internet, an industrial internet intrusion detection method based on light gradient boosting machine optimization was proposed.To address the problem of low detection accuracy caused by difficult-to-classify samples in industrial internet business data, the original loss function of the light gradient boosting machine as a focal loss function was improved.This function can dynamically adjust the loss value and weight of different types of data samples during the training process, reducing the weight of easy-to-classify samples to improve detection accuracy for difficult-to-classify samples.Then a fruit fly optimization algorithm was used to select the optimal parameter combination of the model for the problem that the light gradient boosting machine has many parameters and has great influence on the detection accuracy, detection time and fitting degree of the model.Finally, the optimal parameter combination of the model was obtained and verified on the gas pipeline dataset provided by Mississippi State University, then the effectiveness of the proposed mode was further verified on the water dataset.The experimental results show that the proposed method achieves higher detection accuracy and lower detection time than the comparison model.The detection accuracy of the proposed method on the gas pipeline dataset is at least 3.14% higher than that of the comparison model.The detection time is 0.35s and 19.53s lower than that of the random forest and support vector machine in the comparison model, and 0.06s and 0.02s higher than that of the decision tree and extreme gradient boosting machine, respectively.The proposed method also achieved good detection results on the water dataset.Therefore, the proposed method can effectively identify attack data samples in industrial internet business data and improve the practicality and efficiency of intrusion detection in the industrial internet.…”
Get full text
Article -
5212
Entrepreneurial strategies for sustainable growth: a deep dive into cloud-native technology and its applications
Published 2025-02-01“…The urgency to incorporate and develop new security features and tools for measurement is necessary. …”
Get full text
Article -
5213
Military and Political Studies
Published 2014-10-01“…Military and political studies allow us to understand how the development of military technology and military organization of the state affected by the political situation in the world, the national security of the country and its place in the system of international relations. …”
Get full text
Article -
5214
Games and gamers: the influence of participating players on the process and outcome of regional spatial energy games
Published 2025-01-01“…Our approach assigns different attributes to individual players which secures that the game is played from various perspectives and by actual stakeholders. …”
Get full text
Article -
5215
THE ROLE OF INFORMANTS IN THE ACCENTUATION OF ARMED BANDITRY IN NORTH-WESTERN NIGERIA: A CASE STUDY OF ZAMFARA STATE
Published 2024-07-01“…This development is a threat to national security and the effort to combat armed banditry in the north-western region and Zamfara State in particular. …”
Get full text
Article -
5216
Investigating the Legacies of Violence and Conflict in Transitional Justice and Peace
Published 2022-06-01“…Therefore, various political actors have engaged in promoting the rule of law and the promotion of peace through security sector reform. With the focus on transitional justice, various processes have been considered through the promotion of rule of law, security, and accountability in the Niger Delta and the northeast of Nigeria that have been ravaged by insurgency, terrorism, violence, and conflict, and these processes have been supported and developed by an increasing number of actors at the national and international levels. …”
Get full text
Article -
5217
A Strain Rate-Dependent Damage Evolution Model for Concrete Based on Experimental Results
Published 2021-01-01Get full text
Article -
5218
Geo-Ecological Analysis of the Causes and Consequences of Flooding in the Western Region of Kazakhstan
Published 2025-01-01Get full text
Article -
5219
Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing
Published 2022-06-01“…Proxy re-encryption allows a proxy to convert a ciphertext related to a certain access policy into another one with a different access policy without uncovering the underlying plaintext, which makes the proxy re-encryption technology to be an important technology for data sharing between users.However, the proxy re-encryption schemes are mostly based on single authority, which have some problems such as single power and performance bottleneck of the authority organization and high computing burden on user’s client.At the same time, most schemes do not have the five basic characteristics of proxy re-encryption: one-way encryption, non-interaction, repeatability, controllability and verifiability.In order to solve these problems, a CP-ABE proxy re-encryption scheme for cloud computing based on multi-authority with repeatability and controllability was proposed.Based on the ciphertext policy attribute encryption scheme, proxy servers of encryption and decryption were introduced to reduce the computing burden on the user’s client, and multi-attribute authorization were set to disperse the authority of the central authority.The proxy re-encryption was improved from multiple aspects.Random factors and ciphertext sub-item set in the re-encryption key can realize one-way encryption and controllability.The re-encryption key was independently generated by the client without the participation of servers, which can support users to share data when the data owner is not online.Encrypting the ciphertext sub-item set in the initial ciphertext many times can achieve repeatability.The verification sub-item set in the initial ciphertext allowed the user to verify whether the outsourcing and re-encryption results were correct.Compared with other schemes, the user’s client computing overhead of the proposed scheme was small, and the user can decrypt the original ciphertext only by performing constant times of exponential operation.Based on q-parallel BDHE assumption, the security analysis showed that the proposed scheme is secure against chosen-ciphertext attack (CCA) under the standard model.…”
Get full text
Article -
5220
Sistem Keamanan Multi Mail Server dengan Teknik Enkripsi OPENPGP pada Zimbra Exchange Open Source Software
Published 2020-05-01“…The test results show that the OpenPGP method works well for the security of the email sending/receiving system on a multi-mail server. …”
Get full text
Article