Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6201
Survey of Firearm Storage Practices and Preferences Among Parents and Caregivers of Children
Published 2024-11-01“…Our results suggest that rapid-access devices may be the most preferable firearm storage devices for distribution by secure storage programs, and costs are likely minimal given parental/caregiver willingness to pay.…”
Get full text
Article -
6202
De la controverse à la conversion : Venise et la défense de la rhétorique dans The Ephemerides of Phialo de Stephen Gosson
Published 2008-03-01“…Ultimately, if Gosson failed to secure Sir Philip Sidney’s patronage—despite dedicating The Ephemerides to Sidney—he contributed to including and furthering the image of Venice within the field of prose fiction while denouncing the very evils of fiction itself.…”
Get full text
Article -
6203
An Adaptive Time-Stepping Algorithm for the Allen–Cahn Equation
Published 2022-01-01Get full text
Article -
6204
Leveraging edge learning and game theory for intrusion detection in Internet of things
Published 2021-06-01“…With the commercialization of 5G and the development of 6G, more and more Internet of things (IoT) devices are linked to the novel cyber-physical system (CPS) to support intelligent decision making.However, the highly decentralized and heterogeneous IoT devices face potential threats that may mislead the CPS.Traditional intrusion detection solutions cannot protect the privacy of IoT devices, and they have to deal with the single point of failure, which prevents these solutions from being deploying in IoT scenarios.The edge learning and game theory based intrusion detection for IoT was proposed.Firstly, an edge learning based intrusion detection framework was proposed to detect potential threats in IoT.Moreover, a multi-leader multi-follower game was employed to motivate trusted parameter servers and edge devices to participate in the edge learning process.Experiments and evaluations show the security and effectiveness of the proposed intrusion detection framework.…”
Get full text
Article -
6205
Cellular automata model based power network attack prediction technology
Published 2023-04-01“…The prediction range of the traditional power network attack range prediction technology was not wide enough, resulting in the poor effect of power network security improvement.For this reason, a power network attack prediction technology based on cellular automata model was proposed.A cellular automata model was built, regarding the cells in the cellular automata as power cells, a cell vitality value conversion rule was established and combined with the attack probability of attackers to predict the development and change of power cells.The power network attack was predicted according to the change trend of central power cells and neighboring power cells.The experimental result shows that, under the influence of time factors, the predicted attack node location of the proposed power network attack prediction technology based on cellular automata model is basically consistent with the original node, and the predicted load removal is always below 100 MW, the proposed technology is more effective.…”
Get full text
Article -
6206
La “familizzazione” dell’impresa: alcune riflessioni sul familismo imprenditoriale in Brianza nella crisi economica attuale
Published 2017-03-01“…The leader of a small family firm may decide to include or to exclude some kin members from the process of intergenerational succession in order to secure corporate earnings and good performance in the upcoming future. …”
Get full text
Article -
6207
Evacuation Model of Emotional Contagion Crowd Based on Cellular Automata
Published 2021-01-01“…Crowd evacuation under emergency is an important task of world public security research and practice. In order to describe the microemotional contagion of evacuation individuals, a cellular automata-based evacuation model of emotional contagion crowd based on the classical SIS model of infectious diseases is proposed in this paper. …”
Get full text
Article -
6208
Novel hierarchical identity-based encryption scheme from lattice
Published 2017-11-01“…Aiming at the high complexity in user’s private key extraction and large expansion ratio of trapdoor size in previous hierarchical identity-based encryption (HIBE) schemes,a new HIBE scheme was proposed.The implicit extension method to improve preimage sampling algorithm was used,and then combined the improved algorithm with MP12 trapdoor delegation algorithm to construct an efficient HIBE user’s private key extraction algorithm.Finally,the new extraction algorithm and the Dual-LWE algorithm was integrated to complete the scheme.Compared with the similar schemes,the efficiency of the proposed scheme was improved in system establishment and user’s private key extraction stage,the trapdoor size grows only linearly with the system hierarchical depth,and the improved preimage sample algorithm partly solves the Gaussian parameter increasing problem induced by MP12 trapdoor delegation.The security of the proposed scheme strictly reduces to the hardness of decisional learning with errors problem in the standard model.…”
Get full text
Article -
6209
Information freshness orientated wireless network design for 6G
Published 2020-03-01“…The development of the Internet of things has led to the deployment and application of various real-time monitoring systems (such as intelligent driving) and status update systems (such as industrial control).For the above systems,the freshness of information is particularly important.If the destination receives outdated information,it may reduce the accuracy and reliability of the system’s decision-making and cause severe security risks.In the future 6G network,the freshness of information will become increasingly important for information update applications.In order to characterize the freshness of information effectively,the academic world has proposed the concept of age of information (AoI).Recently,AoI has quickly become a new performance index and research hotspot of wireless systems.Firstly the research history of information age was reviewed.Then,the key issues of AoI introduced in different network models (such as single-user networks,single-hop networks,and multi-user networks) were analyzed.Finally the future research trend was prospected.…”
Get full text
Article -
6210
Concept development assessment game – suitable collecting framework in scientific military research
Published 2025-01-01“… Scientific research is crucial for progress across all areas of society, including the military sphere. However, as the security environment becomes increasingly dynamic, unpredictable, and complex, research methods in military sciences must address contemporary challenges by providing flexible frameworks for evaluating and testing new concepts necessary for the adaptation of force structures. …”
Get full text
Article -
6211
Aggregated privacy-preserving auditing for cloud data integrity
Published 2015-10-01“…To solve the problem of data integrity in cloud storage,an aggregated privacy-preserving auditing scheme was proposed.To preserve data privacy against the auditor,data proof and tag proof were encrypted and combined by using the bilinearity property of the bilinear pairing on the cloud server.Furthermore,an efficient index mechanism was designed to support dynamic auditing,which could ensure that data update operations did not lead to high additional computation or communication cost.Meanwhile,an aggregation method for different proofs was designed to handle multiple auditing requests.Thus the proposed scheme could also support batch auditing for multiple owners and multiple clouds and multiple files.The communication cost of batch auditing was independent of the number of auditing requests.The theoretical analysis and experimental results show that the proposed scheme is provably secure.Compared with existing auditing scheme,the efficacy of the proposed individual auditing and batch auditing improves 21.5% and 31.8% respectively.…”
Get full text
Article -
6212
DDoS attack detection method based on conditional entropy and GHSOM in SDN
Published 2018-08-01“…Software defined networking (SDN) simplifies the network architecture,while the controller is also faced with a security threat of “single point of failure”.Attackers can send a large number of forged data flows that do not exist in the flow tables of the switches,affecting the normal performance of the network.In order to detect the existence of this kind of attack,the DDoS attack detection method based on conditional entropy and GHSOM in SDN (MBCE&G) was presented.Firstly,according to the phased features of DDoS,the damaged switch in the network was located to find the suspect attack flows.Then,according to the diversity characteristics of the suspected attack flow,the quaternion feature vector was extracted in the form of conditional entropy,as the input features of the neural network for more accurate analysis.Finally,the experimental environment was built to complete the verification.The experimental results show that MBCE&G detection method can effectively detect DDoS attacks in SDN network.…”
Get full text
Article -
6213
No Easy Way In
Published 2025-01-01“…This, in turn, further erodes solidarity amongst squatters, prompting Keith to turn to new methods of securing accommodation. Keywords: squatting, community, neoliberalism, solidarity, criminalisation, housing …”
Get full text
Article -
6214
LEADERSHIP, GOOD GOVERNANCE AND DEVELOPMENT IN NIGERIA
Published 2023-12-01“…The paper recommended the use of electronic voting systems and the demonstration of material and human security as solutions to problems. Others include removing the immunity provision for those holding political office and reorienting the country. …”
Get full text
Article -
6215
Volume-hiding encrypted multi-map scheme based on hierarchical structure
Published 2024-01-01“…The volume-hiding encrypted multi-map (EMM) scheme is able to prevent attackers from inferring plaintext through the volume leakage, but existing solutions have problems with large storage and search computational costs.Based on the characteristic that the volume of the searched data often follows Zipf’s law, a hierarchical volume-hiding EMM scheme was proposed.Compared to the plain scheme that filled all keys’ volumes equally, converting the filling of the overall data into the filling of multiple sub-data blocks could reduce storage costs, and also achieved constant level complexity query overhead.Security analysis shows that the proposed scheme can achieve hidden matching volume without loss of query results.Simulation results show that compared with the most efficient scheme XorMM, the proposed scheme can increase the storage overhead by 10%, reduce the search computing overhead by 90%, and significantly improve the search efficiency.…”
Get full text
Article -
6216
AN AXIOLOGICAL APPROACH TO MENTAL MAPS: CROATIAN HIGH-SCHOOL STUDENTS' VIEWS OF EUROPE
Published 2021-02-01“…Groups of evaluation criteria were identified, the most important of which being the following: (a) Employment opportunities, economic conditions and economic development; (b) Culture, way of life, cultural landscape; (c) Political and legal order, social security, and freedom; and (d) Ethnopsychological factors. …”
Get full text
Article -
6217
Anonymizing region construction scheme based on query range in location-based service privacy protection
Published 2017-09-01“…Since k-anonymity method can reduce the users’ computation cost and provides the precise query results,it has been widely used to protect the user’s privacy in location-based service.However,the existing schemes did not consider the size of the querying region for location based service provider (LSP) during the construction of the anonymizing region,which led that the quality of service was low.To solve this problem,the user’s querying range was introduced to present a novel anonymizing region construction scheme.In the proposal,the anonymity server first generated the original anonymizing sub-regions according to the user’s privacy requirements,and then merged these sub-regions to construct the anonymity region submitted to LSP based on the size of corresponding querying regions.The security and experiment analysis show that the presented scheme not only protects the user’s privacy effectively,but also decreases LSP’s querying regions,thereby improving the quality of service.…”
Get full text
Article -
6218
A Privacy-Preserving Biometric Recognition System with Visual Cryptography
Published 2022-01-01“…Experimental results show that our proposed method keeps the high accuracy of the feature recognition system when providing security.…”
Get full text
Article -
6219
The Role of Civil Defense in the Republic of Serbia’s Crisis Management System
Published 2024-12-01Get full text
Article -
6220
The Role of Civil Defense in the Republic of Serbia’s Crisis Management System
Published 2024-12-01Get full text
Article