Showing 7,241 - 7,260 results of 9,720 for search '"Securities ', query time: 0.05s Refine Results
  1. 7241

    Serbian diplomacy in deterrence by Blagojević Veljko

    Published 2023-01-01
    “…The goal of this paper is, relying on a realistic theoretical foundation, to provide an analysis of diplomatic functions and examine its significance for effective deterrence and the necessity of synchronized action with other foreign policy instruments; instruments that were primarily developed for deterrence but can be utilized differently if diplomacy fails to navigate the security dilemma's failings.…”
    Get full text
    Article
  2. 7242

    Analysis of the Mechanism of Political Cost in the Complex Environmental Governance System by Xintao Li, Tongshun Cheng, Zaisheng Zhang, Li Zhao

    Published 2022-01-01
    “…The emergence of conflicts between environmental safety incidents and protection rights generates sizeable political costs, which endangers the legitimacy of the government as well as political security and stability. This article further examines the role of political costs in environmental issues. …”
    Get full text
    Article
  3. 7243
  4. 7244

    Metrics for code obfuscation based on symbolic execution and N-scope complexity by Yuqiang XIAO, Yunfei GUO, Yawen WANG

    Published 2022-12-01
    “…Code obfuscation has been well developed as mitigated endogenous security technology, to effectively resist MATE attacks (e.g.reverse engineering).And it also has important value for the reasonable metrics of code obfuscation effect.Since symbolic execution is widely used in anti-obfuscation attacks, metrics for code obfuscation resilience can refer to the efforts of generating input test set for executing all program paths.However, some adversarial techniques could reduce the symbol execution efficiency significantly based on the nested structure of the program and increase the error of the resilience reference.To solve the above problems, a metrics for code obfuscation was proposed based on symbolic execution and N-scope complexity.The obfuscation resilience was defined with symbolic execution time and obfuscation potency was defined based on the proposed N-scope complexity for better robustness in measuring the resilience of multi-nested structure programs.Furthermore, the correlation analysis of obfuscation effect was proposed and the effect was quantified by symbolic execution and control flow diagram extraction of programs.Over 4000 obfuscated programs from 3 open-sourced assemblies were evaluated with proposed metrics in the experiment, which indicated the generalization performance and practicality of the metrics.And an example of this metrics application was presented in a simulated obfuscation scenario which provided references of obfuscation technology metrics and obfuscation configuration for obfuscation users.…”
    Get full text
    Article
  5. 7245

    Armenia: an Uneasy Choice Between Russia's New Initiatives and the EU Eastern Partnership by M. Y. Vardazaryan

    Published 2014-02-01
    “…Deepened strategic cooperation with Moscow, first of all, provides military and energy security of Armenia, although the economic factor shouldn't be underestimated. …”
    Get full text
    Article
  6. 7246

    Analysis method on the properties of social networks of internet nuisance communities by WANG Bo, GUO Jie, QIU Weidong, HUANG Zheng

    Published 2024-06-01
    “…With the widespread adoption of the Internet and an increase in the number of Internet users, the security of the network environment has been seriously threatened by Internet public hazards organizations, such as the Internet water army and the internet public hazards community. …”
    Get full text
    Article
  7. 7247
  8. 7248

    Integrating AI and statistical methods for enhancing civil structures: current trends, practical issues and future direction by Asraar Anjum, Meftah Hrairi, Abdul Aabid, Maisarah Ali

    Published 2025-01-01
    “…The investigation also highlights the need for substantial computational resources, data privacy, security, and software interoperability. By addressing these issues, the review not only shows advancements in optimization techniques but also outlines future research directions, aiming to bridge the gap between theoretical developments and practical applications in civil engineering. …”
    Get full text
    Article
  9. 7249

    VALUE CHAIN IN AGRICULTURE: THE CASE OF THE EUROPEAN UNION by Sanja Franc, Vlatka Bilas, Lana Trifunić

    Published 2021-05-01
    “…Through a deduction method, certain conclusions were made about the state of the EU food system as well as demand and supply trends in order to provide a broader understanding of the food security and the significance of agricultural sector in general. …”
    Get full text
    Article
  10. 7250

    Russian Language in the Central Asia Region by K. P. Borishpolets

    Published 2014-04-01
    “…Its positions as an active communication channel is secured not only by the social tradition, but also by the competitiveness of the Russian language education, advantages of the bilingual business, requirements of the labor migrants, HR interests and by some other pragmatic thoughts, which role within the context of Eurasian economic integration will increase. …”
    Get full text
    Article
  11. 7251

    Cooperative spectrum sensing scheme based on crowd trust and decision-making mechanism by Xiao-mao WANG, Chuan-he HUANG, Yi-long LV, Bin WANG, Xi-ying FAN, Hao ZHOU

    Published 2014-03-01
    “…A distributed consensus-based scheme by simulating the crowd trust and decision-making mechanism was proposed.This scheme firstly predicts the dynamic trust value among sensing users by the previous cooperative process,and then generates the user's relative trust value,and makes the data interaction among the users by using the combination of relative trust value and decision-making mechanism.All users' state can reach a consensus as the credible and iterative data interaction.All users get the final results by the determinant algorithm.This new spectrum sensing scheme utilizes the imbalance of each users' sensing ability in the real environment.Each secondary user can maintain cooperation with others only through the local information exchange with the neighbors.It is quite different from traditional spectrum sensing scheme,such as OR-rule,1-out-of-N rule and ordinary iterative method.Three SSDF attacks were analysed,on the basis of the corresponding anti-attack policy was proposed.Theoretical analysis and simulation results show that the new scheme is better than the existing cooperative spectrum sensing algorithm in accuracy and security.New scheme not only can improve the accuracy of spectrum sensing but also has the strong anti-attack capability.…”
    Get full text
    Article
  12. 7252
  13. 7253

    Research on the Elbow Passing Ability of Crawler Pipeline Inspection and Repair Robots by Li Jian, Yan Hongwei, Liu Yi, Kou Ziming, Zhang Dengxiao

    Published 2023-04-01
    “…The research on the passing ability of the crawler-type pipeline inspection and repair robot can provide some references for the stable inspection, emergency security and treatment of oil and gas pipelines.…”
    Get full text
    Article
  14. 7254

    SECHA: A Smart Energy-Efficient and Cost-Effective Home Automation System for Developing Countries by Abdulhafiz Ahmed Mustofa, Yohannes Alemayehu Dagnew, Prabhakar Gantela, M. Javed Idrisi

    Published 2023-01-01
    “…They simplify our lives, reduce workloads, improve home safety and security, and pave the way for newer developments. …”
    Get full text
    Article
  15. 7255
  16. 7256

    Sizing and Simulation of PV-Wind Hybrid Power System by Mustafa Engin

    Published 2013-01-01
    “…The output of the program will display the performance of the system during the year, the total cost of the system, and the best size for the PV-generator, wind generator, and battery capacity. Security lightning application is selected, whereas system performance data and environmental operating conditions are measured and stored. …”
    Get full text
    Article
  17. 7257

    Detection of Data Integrity Attack Using Model and Data-Driven-Based Approach in CPPS by G. Y. Sree Varshini, S. Latha

    Published 2023-01-01
    “…Protecting sensitive data from data integrity attacks (DIA) is essential for ensuring system security and reliability. A tragic event will occur if the attack goes unreported. …”
    Get full text
    Article
  18. 7258

    THE IMPOVERISHED AND THEIR ENTITLEMENT TO ADEQUATE HOUSING: A SYNTHETIC ANALYSIS by DAVID KUMIJE, ABUBAKAR ZUBAIRU AGUYE

    Published 2023-12-01
    “…This paper aims to explore the relationship between poverty and the challenge the poor face to secure adequate shelter in Nigeria. Shelter is a crucial key among the basic necessities of life, and it is one of the fundamental rights recognized by many constitutions worldwide. …”
    Get full text
    Article
  19. 7259

    Deep Learning Based DDoS Attack Detection by Xu Ziyi

    Published 2025-01-01
    “…Nowadays, one of the biggest risks to network security is Distributed Denial of Service (DDoS) assaults, which cause disruptions to services by flooding systems with malicious traffic. …”
    Get full text
    Article
  20. 7260

    Impossible differential cryptanalysis of Saturnin algorithm by Zilong JIANG, Chenhui JIN

    Published 2022-03-01
    “…A lightweight block cipher, Saturnin, is an AES-like algorithm.In a resource-constrained environment, Saturnin can also provide high security.The impossible differential analysis on Saturnin was proposed.First, based on the structure of Saturnin, the sufficient condition of 3.5-round impossible differential distinguisher of Saturnin was presented and proved, and 2<sup>70.1</sup>truncated impossible differential distinguishers could be quickly constructed by utilizing the sufficient condition.Then, from the constructed 2<sup>70.1</sup>distinguishers, the 64 distinguishers could be picked out pointedly and classified into four types.Four attack trails could be obtained by appending two rounds before the four types of distinguishers.These four attack trails had the same plaintext structure and a number of common subkey bits.With the help of these two properties, the complexity of the attack scheme could be reduced.Combined with the analysis technologies such as early abort, present the 5.5-round impossible differential attack scheme with 2<sup>176.88</sup>chosen plaintexts, 2<sup>143.88</sup> 256-bit blocks, and 2<sup>176.91</sup>5.5-round encryption.As so far, this is the known attack scheme for Saturnin against impossible differential attack.…”
    Get full text
    Article