Showing 5,621 - 5,640 results of 9,720 for search '"Securities ', query time: 0.12s Refine Results
  1. 5621

    Violent behaviour during sports event or public gathering: Disscutable questions in doctrine and court practice by Marjanović Đorđe B.

    Published 2024-01-01
    “…In the third part of the paper, the author analyzes the position of the article of the Criminal Code in which violent behavior during sports events or other public gatherings is criminalized, and which obligates the courts to impose the security measure of prohibition from attending certain sports events on the perpetrators of this act at sports events. …”
    Get full text
    Article
  2. 5622
  3. 5623

    USING ARTIFICIAL INTELLIGENCE (AI) AND DEEP LEARNING TECHNIQUES IN FINANCIAL RISK MANAGEMENT by Joseph Olorunfemi AKANDE

    Published 2024-12-01
    “…Moreover, federated learning systems present a promising solution for ensuring privacy and security when dealing with sensitive financial data. …”
    Get full text
    Article
  4. 5624

    A Framework for Privacy-Preserving in IoV Using Federated Learning With Differential Privacy by Muhammad Adnan, Madiha Haider Syed, Adeel Anjum, Semeen Rehman

    Published 2025-01-01
    “…Vehicles in the VANET are highly connected to each other and this thing can cause security, safety, and privacy risks for the asset itself and driver also. …”
    Get full text
    Article
  5. 5625
  6. 5626

    The influence of the choice of foreign policy strategies of the Republic of Serbia and Montenegro on the development of their bilateral military relations by Spasojević Čedo D.

    Published 2024-01-01
    “…n a complex system of international relations and current geopolitical and security architecture at the global level, states, in accordance with their economic, military and other potentials, choose foreign policy strategies. …”
    Get full text
    Article
  7. 5627

    USING ARTIFICIAL INTELLIGENCE (AI) AND DEEP LEARNING TECHNIQUES IN FINANCIAL RISK MANAGEMENT by Joseph Olorunfemi AKANDE

    Published 2023-12-01
    “…Moreover, federated learning systems present a promising solution for ensuring privacy and security when dealing with sensitive financial data. …”
    Get full text
    Article
  8. 5628
  9. 5629

    ‘I haven’t met them, I don’t have any trust in them. It just feels like a big unknown’: a qualitative study exploring the determinants of consent to use Human Fertilisation and Emb... by Claire Carson, Lisa Hinton, Jenny Kurinczuk, Maria Quigley

    Published 2019-05-01
    “…Public understanding of data use and security is relatively poor; increased public trust in, and awareness of, research based on routine data could improve consent to data use and reduce the risk of bias.…”
    Get full text
    Article
  10. 5630
  11. 5631
  12. 5632

    PoWBWM: Proof of work consensus cryptographic blockchain-based adaptive watermarking system for tamper detection applications by P. Aberna, L. Agilandeeswari

    Published 2025-01-01
    “…The security is ensured only when the embedded hash key is authentic with its previous block to proceed further extraction process. …”
    Get full text
    Article
  13. 5633
  14. 5634

    Analysis of Autonomous Penetration Testing Through Reinforcement Learning and Recommender Systems by Ariadna Claudia Moreno, Aldo Hernandez-Suarez, Gabriel Sanchez-Perez, Linda Karina Toscano-Medina, Hector Perez-Meana, Jose Portillo-Portillo, Jesus Olivares-Mercado, Luis Javier García Villalba

    Published 2025-01-01
    “…To enhance the effectiveness of these tests, Machine Learning (ML) has been integrated, showing significant potential for identifying anomalies across various security areas through detailed detection of underlying malicious patterns. …”
    Get full text
    Article
  15. 5635
  16. 5636

    Blockchain-driven demand side management in P2P energy markets for islanded microgrid systems by Abdullah Umar, Sumit Kumar Jha, Deepak Kumar, Tirthadip Ghose, Subhransu Ranjan Samantaray

    Published 2025-01-01
    “…This integration enhances transparency, security, and efficiency in the microgrid. During the registration phase, all devices are authenticated and authorized through a secure, transparent blockchain ledger. …”
    Get full text
    Article
  17. 5637
  18. 5638
  19. 5639
  20. 5640

    Effects of Furrow Corn Straw Mulch on Soil Erosion and Organic Carbon Loss in Sloping Farmland in the Black Soil Region by Haiou Shen, Hongli Li, Hang Liu, Jialong Wu, Chunli Li, Yushi Liang

    Published 2024-12-01
    “…Black soil with high fertility is a valuable soil resource, which plays an important role in guaranteeing regional food security and ecological security. Straw return is also a widely recognized way of straw resource utilization. …”
    Get full text
    Article