Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7241
Serbian diplomacy in deterrence
Published 2023-01-01“…The goal of this paper is, relying on a realistic theoretical foundation, to provide an analysis of diplomatic functions and examine its significance for effective deterrence and the necessity of synchronized action with other foreign policy instruments; instruments that were primarily developed for deterrence but can be utilized differently if diplomacy fails to navigate the security dilemma's failings.…”
Get full text
Article -
7242
Analysis of the Mechanism of Political Cost in the Complex Environmental Governance System
Published 2022-01-01“…The emergence of conflicts between environmental safety incidents and protection rights generates sizeable political costs, which endangers the legitimacy of the government as well as political security and stability. This article further examines the role of political costs in environmental issues. …”
Get full text
Article -
7243
-
7244
Metrics for code obfuscation based on symbolic execution and N-scope complexity
Published 2022-12-01“…Code obfuscation has been well developed as mitigated endogenous security technology, to effectively resist MATE attacks (e.g.reverse engineering).And it also has important value for the reasonable metrics of code obfuscation effect.Since symbolic execution is widely used in anti-obfuscation attacks, metrics for code obfuscation resilience can refer to the efforts of generating input test set for executing all program paths.However, some adversarial techniques could reduce the symbol execution efficiency significantly based on the nested structure of the program and increase the error of the resilience reference.To solve the above problems, a metrics for code obfuscation was proposed based on symbolic execution and N-scope complexity.The obfuscation resilience was defined with symbolic execution time and obfuscation potency was defined based on the proposed N-scope complexity for better robustness in measuring the resilience of multi-nested structure programs.Furthermore, the correlation analysis of obfuscation effect was proposed and the effect was quantified by symbolic execution and control flow diagram extraction of programs.Over 4000 obfuscated programs from 3 open-sourced assemblies were evaluated with proposed metrics in the experiment, which indicated the generalization performance and practicality of the metrics.And an example of this metrics application was presented in a simulated obfuscation scenario which provided references of obfuscation technology metrics and obfuscation configuration for obfuscation users.…”
Get full text
Article -
7245
Armenia: an Uneasy Choice Between Russia's New Initiatives and the EU Eastern Partnership
Published 2014-02-01“…Deepened strategic cooperation with Moscow, first of all, provides military and energy security of Armenia, although the economic factor shouldn't be underestimated. …”
Get full text
Article -
7246
Analysis method on the properties of social networks of internet nuisance communities
Published 2024-06-01“…With the widespread adoption of the Internet and an increase in the number of Internet users, the security of the network environment has been seriously threatened by Internet public hazards organizations, such as the Internet water army and the internet public hazards community. …”
Get full text
Article -
7247
Advancing GAN Deepfake Detection: Mixed Datasets and Comprehensive Artifact Analysis
Published 2025-01-01Get full text
Article -
7248
Integrating AI and statistical methods for enhancing civil structures: current trends, practical issues and future direction
Published 2025-01-01“…The investigation also highlights the need for substantial computational resources, data privacy, security, and software interoperability. By addressing these issues, the review not only shows advancements in optimization techniques but also outlines future research directions, aiming to bridge the gap between theoretical developments and practical applications in civil engineering. …”
Get full text
Article -
7249
VALUE CHAIN IN AGRICULTURE: THE CASE OF THE EUROPEAN UNION
Published 2021-05-01“…Through a deduction method, certain conclusions were made about the state of the EU food system as well as demand and supply trends in order to provide a broader understanding of the food security and the significance of agricultural sector in general. …”
Get full text
Article -
7250
Russian Language in the Central Asia Region
Published 2014-04-01“…Its positions as an active communication channel is secured not only by the social tradition, but also by the competitiveness of the Russian language education, advantages of the bilingual business, requirements of the labor migrants, HR interests and by some other pragmatic thoughts, which role within the context of Eurasian economic integration will increase. …”
Get full text
Article -
7251
Cooperative spectrum sensing scheme based on crowd trust and decision-making mechanism
Published 2014-03-01“…A distributed consensus-based scheme by simulating the crowd trust and decision-making mechanism was proposed.This scheme firstly predicts the dynamic trust value among sensing users by the previous cooperative process,and then generates the user's relative trust value,and makes the data interaction among the users by using the combination of relative trust value and decision-making mechanism.All users' state can reach a consensus as the credible and iterative data interaction.All users get the final results by the determinant algorithm.This new spectrum sensing scheme utilizes the imbalance of each users' sensing ability in the real environment.Each secondary user can maintain cooperation with others only through the local information exchange with the neighbors.It is quite different from traditional spectrum sensing scheme,such as OR-rule,1-out-of-N rule and ordinary iterative method.Three SSDF attacks were analysed,on the basis of the corresponding anti-attack policy was proposed.Theoretical analysis and simulation results show that the new scheme is better than the existing cooperative spectrum sensing algorithm in accuracy and security.New scheme not only can improve the accuracy of spectrum sensing but also has the strong anti-attack capability.…”
Get full text
Article -
7252
G/M/N Queuing Model-Based Research on the Parking Spaces for Primary and Secondary School
Published 2020-01-01Get full text
Article -
7253
Research on the Elbow Passing Ability of Crawler Pipeline Inspection and Repair Robots
Published 2023-04-01“…The research on the passing ability of the crawler-type pipeline inspection and repair robot can provide some references for the stable inspection, emergency security and treatment of oil and gas pipelines.…”
Get full text
Article -
7254
SECHA: A Smart Energy-Efficient and Cost-Effective Home Automation System for Developing Countries
Published 2023-01-01“…They simplify our lives, reduce workloads, improve home safety and security, and pave the way for newer developments. …”
Get full text
Article -
7255
-
7256
Sizing and Simulation of PV-Wind Hybrid Power System
Published 2013-01-01“…The output of the program will display the performance of the system during the year, the total cost of the system, and the best size for the PV-generator, wind generator, and battery capacity. Security lightning application is selected, whereas system performance data and environmental operating conditions are measured and stored. …”
Get full text
Article -
7257
Detection of Data Integrity Attack Using Model and Data-Driven-Based Approach in CPPS
Published 2023-01-01“…Protecting sensitive data from data integrity attacks (DIA) is essential for ensuring system security and reliability. A tragic event will occur if the attack goes unreported. …”
Get full text
Article -
7258
THE IMPOVERISHED AND THEIR ENTITLEMENT TO ADEQUATE HOUSING: A SYNTHETIC ANALYSIS
Published 2023-12-01“…This paper aims to explore the relationship between poverty and the challenge the poor face to secure adequate shelter in Nigeria. Shelter is a crucial key among the basic necessities of life, and it is one of the fundamental rights recognized by many constitutions worldwide. …”
Get full text
Article -
7259
Deep Learning Based DDoS Attack Detection
Published 2025-01-01“…Nowadays, one of the biggest risks to network security is Distributed Denial of Service (DDoS) assaults, which cause disruptions to services by flooding systems with malicious traffic. …”
Get full text
Article -
7260
Impossible differential cryptanalysis of Saturnin algorithm
Published 2022-03-01“…A lightweight block cipher, Saturnin, is an AES-like algorithm.In a resource-constrained environment, Saturnin can also provide high security.The impossible differential analysis on Saturnin was proposed.First, based on the structure of Saturnin, the sufficient condition of 3.5-round impossible differential distinguisher of Saturnin was presented and proved, and 2<sup>70.1</sup>truncated impossible differential distinguishers could be quickly constructed by utilizing the sufficient condition.Then, from the constructed 2<sup>70.1</sup>distinguishers, the 64 distinguishers could be picked out pointedly and classified into four types.Four attack trails could be obtained by appending two rounds before the four types of distinguishers.These four attack trails had the same plaintext structure and a number of common subkey bits.With the help of these two properties, the complexity of the attack scheme could be reduced.Combined with the analysis technologies such as early abort, present the 5.5-round impossible differential attack scheme with 2<sup>176.88</sup>chosen plaintexts, 2<sup>143.88</sup> 256-bit blocks, and 2<sup>176.91</sup>5.5-round encryption.As so far, this is the known attack scheme for Saturnin against impossible differential attack.…”
Get full text
Article