Showing 6,981 - 7,000 results of 9,720 for search '"Securities ', query time: 0.11s Refine Results
  1. 6981

    Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application by Nuri Wulandari, Mohammad Syauqi Adnan, Chastio Bayu Wicaksono

    Published 2022-01-01
    “…A rise in working and studying from home, activities which depend on the Internet, and the exchange of data coupled with a lack of understanding about security for interacting in cyberspace have made cybersecurity one of the most pressing concerns today. …”
    Get full text
    Article
  2. 6982

    Understanding the Internet of Nano Things: overview, trends, and challenges by Mainor Alberto Cruz Alvarado, Patricia Alejandra Bazán

    Published 2018-11-01
    “…It is concluded that technologies prevail current IoNT literature, applications are focused on health care, and there is no international standardization regarding privacy, security or architecture of nano-networks. …”
    Get full text
    Article
  3. 6983

    Research on end hopping and spreading for active cyber defense by Leyi SHI, Hongbin GUO, Xiao WEN, Jianlan LI, Yuwen CUI, Mengfei MA, Hui SUN

    Published 2019-05-01
    “…Inspired by the spread spectrum technology for communications,the concept of end spreading was proposed to represent a piece of information of the data transmission with a sequence of multiple end information,of which each piece of end information was irrelevant to the information it conveys.Thus the covert data transmission can be performed.Further,an active cyber defense model of end information hopping and spreading was presented,in which the hopping strategy was separated from the synchronization strategy.The synchronization was accomplished by means of end information spreading for synchronous authentication of both parties,which can solve the high-speed hopping synchronization problem with high concealment requirements.The mode of generation,transmission and authentication of the spreading sequence,and the data migration strategy in the end hopping and spreading model were described in detail,and the security performance and synchronization performance were analyzed and verified experimentally.Theoretical analysis and experimental results show that the cyber defense model of end information hopping and spreading has improved the availability and confidentiality of network services under high-speed hopping and has good anti-attack performance,which is of great significance for the proactive defense application of high intensity confrontation.…”
    Get full text
    Article
  4. 6984

    Anomaly detection and location of malicious node for IoT based on smart contract in blockchain network by Haojie HUANG, Xiaoxiao WU, Gangqiang LI

    Published 2020-06-01
    “…With the explosive growth of the number of distributed devices in the Internet of things (IoT) network,the security of decentralized multi-agent optimization algorithm has become the forefront problem.The distributed algorithms in the IoT network are vulnerable to data injection attacks from internal malicious node because each agent locally estimates its state without any supervision.In general,the detection methods for malicious node run independently in each agent,inducing issues such as closed data,single points of failure,opaque detection processes,and so on.The proposed strategy considered detecting via an aid of blockchain technology and smart contracts in Ethereum to detect malicious node in the network.Based on the decentralized and multiple backup features of blockchain technology,the multi-site backup features of the blockchain technology enabled data sharing and avoided single point failure.In addition,the contract code,execution process and result of the smart contract were open and transparent,and the contract code and result could not be tampered to ensure that the detection process could be traced and verified.Finally,the average consensus algorithm was adopted as an example,and the proposed strategy was verified on a simplified IoT network implemented by Raspberry Pi.…”
    Get full text
    Article
  5. 6985

    Generative text steganography method based on emotional expression in semantic space by Yuling LIU, Cuilin WANG, Zhangjie FU

    Published 2023-04-01
    “…Aiming at the problems that “over optimizing” the quality of steganographic text and lack of constraints on the semantic expression of the generated steganographic text in existing generative text steganography methods, a generative text steganography method was proposed based on emotional expression in semantic space.In order to make use of the scene fusion provided by the new media platform to obtain many camouflage scenes, the focus was how to use the unsupervised extraction model to extract the emotional expression combination candidate set from the original data set, then sort the candidate set of emotional expression combinations based on the improved bipartite graph sorting algorithm to obtain the emotional expression combination set, map them to the semantic space, and then implement embedding secret information while generating the user’s opinions based on the emotion expression combinations.Experimental results show that, compared with the existing generative text steganography methods in semantic space, the product reviews generated by the proposed method have a minimum perplexity of 10.536, and have a strong correlation with the chosen product, which can further guarantee the cognitive concealment of steganographic texts.At the same time, the proposed method can also be effectively used in the field of secure and confidential communication, and can avoid the senders being traced and analyzed.…”
    Get full text
    Article
  6. 6986

    Spillover: From climate change to pandemics by Mary E. Wilson

    Published 2025-01-01
    “…Animals and plants are themselves susceptible to die-offs and even extinction from infections, jeopardizing food security and health.Another unknown is whether the vast permafrost, now melting, could become a source of novel microbes that are pathogenic for humans.Travel, trade, and migration contribute to the global movement of human and animal pathogens and vectors. …”
    Get full text
    Article
  7. 6987

    SOCIOLOGICAL IMPACT OF VOTE BUYING IN NORTH-WEST ZONE OF NIGERIA: THE STUDY OF THE 2015 AND 2019 ELECTIONS by MU’AZU AHMED MOHAMMED

    Published 2025-01-01
    “…The ill competent ones occupied elective political positions because they used money to secured votes, while the qualified ones were left behind hence, they were unable to use money during primary and secondary elections. …”
    Get full text
    Article
  8. 6988

    O PROERD funciona? Notas a partir de estudo quase-experimental by Marcos Rolim, Daiana Hermann, Camila Louis Oliveira

    Published 2020-01-01
    “…Empirical studies measuring results in the area of public security are still rare in Brazil, a circumstance that adds value to this work. …”
    Get full text
    Article
  9. 6989

    Protective Immunity against SARS Subunit Vaccine Candidates Based on Spike Protein: Lessons for Coronavirus Vaccine Development by Atin Khalaj-Hedayati

    Published 2020-01-01
    “…The recent outbreak of the novel coronavirus disease, COVID-19, has highlighted the threat that highly pathogenic coronaviruses have on global health security and the imminent need to design an effective vaccine for prevention purposes. …”
    Get full text
    Article
  10. 6990

    Maternal and Pediatric Health Outcomes in relation to Gestational Vitamin D Sufficiency by Stephen J. Genuis

    Published 2015-01-01
    “…With increasing evidence pointing to fetal origins of some later life disease, securing vitamin D sufficiency in pregnancy appears to be a simple, safe, and cost-effective measure that can be incorporated into routine preconception and prenatal care in the offices of primary care clinicians. …”
    Get full text
    Article
  11. 6991

    A novel chaotic interleaving algorithm for mobile wireless channels by Xianping WANG, Hui CAO

    Published 2016-07-01
    “…Interleaving technique is an efficient technique to resist serious burst errors over mobile wireless fading channels.To resist 2 dimensionality burst errors effectively,a novel chaotic interleaving algorithm based on Baker map was proposed.In the proposed scheme,the binary source sequence was converted to the data matrix,and then the data matrix was dispersed randomly by using the chaotic Baker map approach,in order to realize the function of transforming 2 dimensionality long bust error into the short 1 dimensionality short bust error after de-interleaving.In additional,the proposed algorithm was combined with the convolution code based on Viterbi decoding,and was applied into the scenario of convolutional codes (2,1,3) and the scenario of (2,1,7) separately for a performance comparison.The simulation results show that the performance of the proposed algorithm outperforms better than the traditional algorithms under image transmission over mobile wireless channel.Moreover,the anti-fading capability of the proposed algorithm grows as the packet length increases,while reducing the complexity significantly.Finally,the chaotic interleaver can also enhance every transmitted packet's security with different secret keys.…”
    Get full text
    Article
  12. 6992

    Research on Spam Filters Based on NB Algorithm by Su Shengyue

    Published 2025-01-01
    “…Spam filtering is a crucial part of network security. As spam becomes more complex, traditional rule-based methods struggle to meet the needs of modern email systems. …”
    Get full text
    Article
  13. 6993

    School Leadership and the Civic Nationalist Turn: towards a typology of leadership styles employed by Head Teachers in their enactment of the Prevent Duty and the promotion of fund... by Hazel Bryan, Lynn Revell

    Published 2021-06-01
    “…Drawing on literature from school leadership, this research engages with head teachers in schools in England to explore the leadership styles they employ when enacting the requirements of the Counter-Terrorism and Security Act 2015 (Home Office, 2015) and the Teachers’ Standards (DfE, 2012) and navigating the civic nationalist turn. …”
    Get full text
    Article
  14. 6994
  15. 6995
  16. 6996

    Climate Smart Agriculture (CSA) for Sustainable Agriculture Nexus: A Tool for Transforming Food Systems by Turyasingura, Benson, Ayiga, Natal, Tumwesigye, Wycliffe, James, Philip Hegarty

    Published 2023
    “…CSA and SA share a common principal goal of achieving food security. It was concluded that developing countries are the worst affected by the negative impacts of climate change and don’t have the adaptive capacity to respond to climate change effects.…”
    Get full text
  17. 6997

    Investigation of Storage and Retrieval of Records At Kisoro District Local Government. by Arinda, Rodgers

    Published 2024
    “…This inadequacy contributes to numerous challenges, including poor professionalism, untimely retrieval of requested records, and insufficient data security. The study recommended allocating more funds to the records section for overall maintenance. …”
    Get full text
    Thesis
  18. 6998
  19. 6999

    Analyzing Iran's Legislative Criminal Policy in Dealing with Environmental Terrorism, Emphasizing the Need for Criminalization and Preventive Measures by behrouz sepehri, Nourooz Kargari, mohammad ashouri, ghassem ghassemi

    Published 2024-10-01
    “…Introduction: environmental security, is a necessary condition for the health and continuity of human life on earth and due to the vital, widespread and inevitable dependence of humans on the environment, if the environmental security is taken away and it is removed from the possibility of healthy living, as a result of the goal or the means of placing the environment, following environmental terrorism, with various methods such as polluting the natural and man-made environment with dangerous substances, extensive and irreparable damage is caused to human life and health And often, the most obvious effects of damage to the safety and health of the environment appear in the form of epidemics, and on the other hand, the cross-border effects of such actions and the possibility of transferring the said effects from through the flow of air or water or the carriers of disease agents to countries and regions beyond the place of the accident, and the possibility of spreading some of these effects on the life and health of future generations, reveals the seriousness of the danger of environmental terrorism, hence, The purpose of this thesis is to explain the vital necessity of legal, technical and specialized contrast, against environmental terrorism in the form of an efficient criminal policy with international interaction, with emphasizing the extent and irreparability of the effects caused by environmental terrorism, and the necessity and importance of preventive measures.Materials and Methods:  In terms of the goal, the current research will cause expansion the legal theories and doctrine and complete the previous theories with the fundamental method of the research results, and also with the practical approach, effective practical solutions to deal with environmental terrorism will be presented, and on the other hand, the materials and information used in the research, They are collected with the library method and after collecting and categorizing the materials and information, with the descriptive-analytical method, the findings and the collected materials are analyzed logically and legally and they are used as the basis of citation to strengthen the approach of the researcher in the relevant subject.Results: In a comprehensive and efficient criminal policy to contrast against environmental terrorism, in addition to criminalizing this criminal phenomenon along with the real conceptology and in addition to recognizing its specific elements, it is expected that with the necessary criminal measures, specialized measures will be taken to identify and criminalize behaviors that it has a preliminary aspect to dangerous crimes, and it is possible that environmental terrorism is also committed through them, and therefore, in order to prevent this criminal phenomenon, criminalize such behaviors in the form of obstruction crimes seems necessary.Discussion: In Iran's criminal system, environmental terrorism has not been considered as an independent criminal behavior, with specific elements and specific conditions, However, due to the inherent of the behaviors related to environmental terrorism, this type of terrorism is inherently reprehensible, and as a rule, it can be included in various legal elements in the criminal laws, and on the other hand, due to the analogy of some elements of this criminal phenomenon with the destruction of the earth, According to jurisprudence, significant examples of environmental terrorism behaviors can be considered as examples of corruption in the land subject to Article 286 of the Islamic Penal Code (approved in 2012). …”
    Get full text
    Article
  20. 7000