Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6981
Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application
Published 2022-01-01“…A rise in working and studying from home, activities which depend on the Internet, and the exchange of data coupled with a lack of understanding about security for interacting in cyberspace have made cybersecurity one of the most pressing concerns today. …”
Get full text
Article -
6982
Understanding the Internet of Nano Things: overview, trends, and challenges
Published 2018-11-01“…It is concluded that technologies prevail current IoNT literature, applications are focused on health care, and there is no international standardization regarding privacy, security or architecture of nano-networks. …”
Get full text
Article -
6983
Research on end hopping and spreading for active cyber defense
Published 2019-05-01“…Inspired by the spread spectrum technology for communications,the concept of end spreading was proposed to represent a piece of information of the data transmission with a sequence of multiple end information,of which each piece of end information was irrelevant to the information it conveys.Thus the covert data transmission can be performed.Further,an active cyber defense model of end information hopping and spreading was presented,in which the hopping strategy was separated from the synchronization strategy.The synchronization was accomplished by means of end information spreading for synchronous authentication of both parties,which can solve the high-speed hopping synchronization problem with high concealment requirements.The mode of generation,transmission and authentication of the spreading sequence,and the data migration strategy in the end hopping and spreading model were described in detail,and the security performance and synchronization performance were analyzed and verified experimentally.Theoretical analysis and experimental results show that the cyber defense model of end information hopping and spreading has improved the availability and confidentiality of network services under high-speed hopping and has good anti-attack performance,which is of great significance for the proactive defense application of high intensity confrontation.…”
Get full text
Article -
6984
Anomaly detection and location of malicious node for IoT based on smart contract in blockchain network
Published 2020-06-01“…With the explosive growth of the number of distributed devices in the Internet of things (IoT) network,the security of decentralized multi-agent optimization algorithm has become the forefront problem.The distributed algorithms in the IoT network are vulnerable to data injection attacks from internal malicious node because each agent locally estimates its state without any supervision.In general,the detection methods for malicious node run independently in each agent,inducing issues such as closed data,single points of failure,opaque detection processes,and so on.The proposed strategy considered detecting via an aid of blockchain technology and smart contracts in Ethereum to detect malicious node in the network.Based on the decentralized and multiple backup features of blockchain technology,the multi-site backup features of the blockchain technology enabled data sharing and avoided single point failure.In addition,the contract code,execution process and result of the smart contract were open and transparent,and the contract code and result could not be tampered to ensure that the detection process could be traced and verified.Finally,the average consensus algorithm was adopted as an example,and the proposed strategy was verified on a simplified IoT network implemented by Raspberry Pi.…”
Get full text
Article -
6985
Generative text steganography method based on emotional expression in semantic space
Published 2023-04-01“…Aiming at the problems that “over optimizing” the quality of steganographic text and lack of constraints on the semantic expression of the generated steganographic text in existing generative text steganography methods, a generative text steganography method was proposed based on emotional expression in semantic space.In order to make use of the scene fusion provided by the new media platform to obtain many camouflage scenes, the focus was how to use the unsupervised extraction model to extract the emotional expression combination candidate set from the original data set, then sort the candidate set of emotional expression combinations based on the improved bipartite graph sorting algorithm to obtain the emotional expression combination set, map them to the semantic space, and then implement embedding secret information while generating the user’s opinions based on the emotion expression combinations.Experimental results show that, compared with the existing generative text steganography methods in semantic space, the product reviews generated by the proposed method have a minimum perplexity of 10.536, and have a strong correlation with the chosen product, which can further guarantee the cognitive concealment of steganographic texts.At the same time, the proposed method can also be effectively used in the field of secure and confidential communication, and can avoid the senders being traced and analyzed.…”
Get full text
Article -
6986
Spillover: From climate change to pandemics
Published 2025-01-01“…Animals and plants are themselves susceptible to die-offs and even extinction from infections, jeopardizing food security and health.Another unknown is whether the vast permafrost, now melting, could become a source of novel microbes that are pathogenic for humans.Travel, trade, and migration contribute to the global movement of human and animal pathogens and vectors. …”
Get full text
Article -
6987
SOCIOLOGICAL IMPACT OF VOTE BUYING IN NORTH-WEST ZONE OF NIGERIA: THE STUDY OF THE 2015 AND 2019 ELECTIONS
Published 2025-01-01“…The ill competent ones occupied elective political positions because they used money to secured votes, while the qualified ones were left behind hence, they were unable to use money during primary and secondary elections. …”
Get full text
Article -
6988
O PROERD funciona? Notas a partir de estudo quase-experimental
Published 2020-01-01“…Empirical studies measuring results in the area of public security are still rare in Brazil, a circumstance that adds value to this work. …”
Get full text
Article -
6989
Protective Immunity against SARS Subunit Vaccine Candidates Based on Spike Protein: Lessons for Coronavirus Vaccine Development
Published 2020-01-01“…The recent outbreak of the novel coronavirus disease, COVID-19, has highlighted the threat that highly pathogenic coronaviruses have on global health security and the imminent need to design an effective vaccine for prevention purposes. …”
Get full text
Article -
6990
Maternal and Pediatric Health Outcomes in relation to Gestational Vitamin D Sufficiency
Published 2015-01-01“…With increasing evidence pointing to fetal origins of some later life disease, securing vitamin D sufficiency in pregnancy appears to be a simple, safe, and cost-effective measure that can be incorporated into routine preconception and prenatal care in the offices of primary care clinicians. …”
Get full text
Article -
6991
A novel chaotic interleaving algorithm for mobile wireless channels
Published 2016-07-01“…Interleaving technique is an efficient technique to resist serious burst errors over mobile wireless fading channels.To resist 2 dimensionality burst errors effectively,a novel chaotic interleaving algorithm based on Baker map was proposed.In the proposed scheme,the binary source sequence was converted to the data matrix,and then the data matrix was dispersed randomly by using the chaotic Baker map approach,in order to realize the function of transforming 2 dimensionality long bust error into the short 1 dimensionality short bust error after de-interleaving.In additional,the proposed algorithm was combined with the convolution code based on Viterbi decoding,and was applied into the scenario of convolutional codes (2,1,3) and the scenario of (2,1,7) separately for a performance comparison.The simulation results show that the performance of the proposed algorithm outperforms better than the traditional algorithms under image transmission over mobile wireless channel.Moreover,the anti-fading capability of the proposed algorithm grows as the packet length increases,while reducing the complexity significantly.Finally,the chaotic interleaver can also enhance every transmitted packet's security with different secret keys.…”
Get full text
Article -
6992
Research on Spam Filters Based on NB Algorithm
Published 2025-01-01“…Spam filtering is a crucial part of network security. As spam becomes more complex, traditional rule-based methods struggle to meet the needs of modern email systems. …”
Get full text
Article -
6993
School Leadership and the Civic Nationalist Turn: towards a typology of leadership styles employed by Head Teachers in their enactment of the Prevent Duty and the promotion of fund...
Published 2021-06-01“…Drawing on literature from school leadership, this research engages with head teachers in schools in England to explore the leadership styles they employ when enacting the requirements of the Counter-Terrorism and Security Act 2015 (Home Office, 2015) and the Teachers’ Standards (DfE, 2012) and navigating the civic nationalist turn. …”
Get full text
Article -
6994
Independent Component Analysis Based on Information Bottleneck
Published 2015-01-01Get full text
Article -
6995
The Use of Machine Learning Methods in Road Safety Research in Poland
Published 2025-01-01Get full text
Article -
6996
Climate Smart Agriculture (CSA) for Sustainable Agriculture Nexus: A Tool for Transforming Food Systems
Published 2023“…CSA and SA share a common principal goal of achieving food security. It was concluded that developing countries are the worst affected by the negative impacts of climate change and don’t have the adaptive capacity to respond to climate change effects.…”
Get full text
-
6997
Investigation of Storage and Retrieval of Records At Kisoro District Local Government.
Published 2024“…This inadequacy contributes to numerous challenges, including poor professionalism, untimely retrieval of requested records, and insufficient data security. The study recommended allocating more funds to the records section for overall maintenance. …”
Get full text
Thesis -
6998
Genome-wide association studies with prolapsed gland of the third eyelid in dogs
Published 2025-01-01Get full text
Article -
6999
Analyzing Iran's Legislative Criminal Policy in Dealing with Environmental Terrorism, Emphasizing the Need for Criminalization and Preventive Measures
Published 2024-10-01“…Introduction: environmental security, is a necessary condition for the health and continuity of human life on earth and due to the vital, widespread and inevitable dependence of humans on the environment, if the environmental security is taken away and it is removed from the possibility of healthy living, as a result of the goal or the means of placing the environment, following environmental terrorism, with various methods such as polluting the natural and man-made environment with dangerous substances, extensive and irreparable damage is caused to human life and health And often, the most obvious effects of damage to the safety and health of the environment appear in the form of epidemics, and on the other hand, the cross-border effects of such actions and the possibility of transferring the said effects from through the flow of air or water or the carriers of disease agents to countries and regions beyond the place of the accident, and the possibility of spreading some of these effects on the life and health of future generations, reveals the seriousness of the danger of environmental terrorism, hence, The purpose of this thesis is to explain the vital necessity of legal, technical and specialized contrast, against environmental terrorism in the form of an efficient criminal policy with international interaction, with emphasizing the extent and irreparability of the effects caused by environmental terrorism, and the necessity and importance of preventive measures.Materials and Methods: In terms of the goal, the current research will cause expansion the legal theories and doctrine and complete the previous theories with the fundamental method of the research results, and also with the practical approach, effective practical solutions to deal with environmental terrorism will be presented, and on the other hand, the materials and information used in the research, They are collected with the library method and after collecting and categorizing the materials and information, with the descriptive-analytical method, the findings and the collected materials are analyzed logically and legally and they are used as the basis of citation to strengthen the approach of the researcher in the relevant subject.Results: In a comprehensive and efficient criminal policy to contrast against environmental terrorism, in addition to criminalizing this criminal phenomenon along with the real conceptology and in addition to recognizing its specific elements, it is expected that with the necessary criminal measures, specialized measures will be taken to identify and criminalize behaviors that it has a preliminary aspect to dangerous crimes, and it is possible that environmental terrorism is also committed through them, and therefore, in order to prevent this criminal phenomenon, criminalize such behaviors in the form of obstruction crimes seems necessary.Discussion: In Iran's criminal system, environmental terrorism has not been considered as an independent criminal behavior, with specific elements and specific conditions, However, due to the inherent of the behaviors related to environmental terrorism, this type of terrorism is inherently reprehensible, and as a rule, it can be included in various legal elements in the criminal laws, and on the other hand, due to the analogy of some elements of this criminal phenomenon with the destruction of the earth, According to jurisprudence, significant examples of environmental terrorism behaviors can be considered as examples of corruption in the land subject to Article 286 of the Islamic Penal Code (approved in 2012). …”
Get full text
Article -
7000
Stakeholder engagement for inclusive climate impact attribution studies
Published 2025-01-01Get full text
Article