Showing 8,581 - 8,600 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 8581

    Designing and Launching a System for Presenting Marine Charts and Spatial Information (Native Marine Web Service) by Ali Hasankhani

    Published 2023-09-01
    “…,Which have sometimes been sanctioned for Iran, by Iranian sailors will bring special security-technical problems. The production and publication of nautical charts is the most important infrastructure of hydrographic knowledge.none of which have achieved the desired result, and at best, they were satisfied with the ability to load grid layers in one system. …”
    Get full text
    Article
  2. 8582

    Modern State and civil society: promising directions and forms of interaction in the field of public administration by O. M. Muzychuk, K. L. Buhaichuk

    Published 2023-10-01
    “…The promising directions of interaction between the modern State and civil society, which are divided into separate forms, include interaction of the State with members of diasporas through various institutions and practices, interaction of the State with civil society institutions formed by higher education students, interaction of the State with civil society in the field of environmental security of the State.…”
    Get full text
    Article
  3. 8583

    Java deserialization gadget chain discovery method based on hybrid analysis by Yongxing WU, Libo CHEN, Kaida JIANG

    Published 2022-04-01
    “…Java deserialization vulnerabilities have become a common threat to Java application security nowadays.Finding out the gadget chain determines whether this type of vulnerability can be exploited.Due to the large code space of Java applications and dependent libraries and the polymorphism of Java itself, manual analysis of Java deserialization gadget chains consumes a lot of time and effort and it is highly dependent on the experienced knowledge.Therefore, it is crucial to study how to efficiently and accurately automate the discovery of gadget chains.Java deserialization gadget chain discovery method based on hybrid analysis was proposed.Call graph based on the variable declaration type was constructed, and then the deserialization entry functions that may reach the dangerous functions were screened using the call graph analysis.The screened entry functions were used as the entry point of the hybrid information flow analysis.The hybrid information flow analysis was carried out for both pointer and tainted variables.The tainted objects created implicitly were marked.The tainted information and the pointer information were propagated simultaneously to construct the hybrid information flow graph.The reachability of external taint data propagation to the dangerous function was judged based on the hybrid information flow graph.The corresponding deserialization gadget chain was constructed according to the taint propagation path.The hybrid analysis took into account the efficiency of call graph analysis and the accuracy of hybrid information flow analysis.The corresponding static analysis tool, namely GadgetSearch, was implemented based on the proposed hybrid analysis method.In the experimental evaluation, GadgetSearch had lower false positive and lower false negative than the existing tool GadgetInspector on four datasets of Ysoserial, Marshalsec, Jackson historical CVE, and XStream historical CVE.Additionally, GadgetSearch also found multiple undisclosed gadget chains.The experimental results show that the proposed method can efficiently and accurately discover the Java deserialization gadget chain in multiple practical Java applications.…”
    Get full text
    Article
  4. 8584
  5. 8585

    Practical skills of psychology bachelors in working with automated HR platforms by P. Bleshmudt, O. Fil

    Published 2024-12-01
    “…Particular attention should be paid to improving data security, which is becoming critical when working with HR platforms, as employees’ personal data needs to be protected from unauthorized access. …”
    Get full text
    Article
  6. 8586

    Analysis of the Energy Complex Member of the EАEU Countries and the Formation of Groups-Technologies of its Digitalization by M. I. Rusetskaya, T. F. Mancerova, E. P. Korsak

    Published 2023-04-01
    “…It is concluded that digitalization of the electric power system on the technical side increases the energy security of the state and the competitiveness of the energy system on the world market, and on the economic side it helps to reduce costs at all stages of the entire technological cycle.…”
    Get full text
    Article
  7. 8587
  8. 8588

    Socio-Adaptive Dimension of Students’ Personal Space by Iryna Havryliuk

    Published 2019-05-01
    “….; however, only a few pieces of research practically view the modal content of students' spatial organization within the limits of their social and adaptive security. Therefore, it is essential to develop empirical programs for studying the modal features of students' personal space in a socio-adaptive dimension. …”
    Article
  9. 8589

    Digital literacy model to improve the marketing skills of micro, small, and medium enterprises women with a community-based educational approach by Trisninawati Trisninawati, Dewi Sartika

    Published 2024-07-01
    “…The main challenges faced are difficulties adapting to digital technology and concerns about digital security. Most respondents still rely on conventional marketing methods and feel less confident managing digital marketing campaigns. …”
    Get full text
    Article
  10. 8590
  11. 8591
  12. 8592

    Employee Performance Evaluation Using A New Preferential Voting Process by Mehdi Soltanifar, Seyed Abdullah Heidariyeh

    Published 2020-11-01
    “…Twelve performance evaluation indicators extracted from the research background by experts in four categories with the titles of service compensation system in the first category; Job security, perceived organizational justice, perceived organizational support, and physical working conditions in the second category; Job characteristics, job clarity and ability of employees in the third category and job feedback, job stress, organizational citizen behaviour and motivation in the fourth category were ranked and documented using a linear optimization model based on the goal programming and policy. …”
    Get full text
    Article
  13. 8593

    Conflicts between indigenous and scientific concepts of landscape management for wildlife conservation: human-chimpanzee politics of coexistence at Bossou, Guinea by Gen Yamakoshi, Vincent Leblan

    Published 2014-02-01
    “…The stated goals of the swidden preparation campaign was to secure land for subsistence purposes, but it is thought that the main driving factor was maintaining the right to decide matters like the allocation of tourism income, which the government research institute was attempting to usurp. …”
    Get full text
    Article
  14. 8594

    Effects of infield rainwater harvesting methods and organic manure in improving soil chemical properties and maize production in low rainfall area of Zimbabwe by Andrew Tapiwa Kugedera, Letticia Kudzai Kokerai

    Published 2025-12-01
    “…It can be concluded that the use of IP + P integrated with cattle manure + compost improves maize yields in smallholder farming environments in semi-arid areas and achieves food security.…”
    Get full text
    Article
  15. 8595

    Youth and the pandemic: health information imaginaries and practices while navigating COVID-19 in Nigeria by Chikezie E. Uzuegbunam

    Published 2025-01-01
    “…The pandemic’s impacts included mental health issues and economic hardship, particularly in a country lacking social security or welfare plans. Following a low vaccination rate among participants, the data revealed vaccine lethargy, “vaccinformation void,” vaccine misinformation, vaccine distrust, and vaccine inaccessibility, due to various reasons and factors at play. …”
    Get full text
    Article
  16. 8596

    Effective factors on variations of wheat production in climatic regions of Fars province by leyla sharifi, saeed bazgeer, hosain mohmmadi, alireza darbaneh astaneh, mostafa karimi ahmadabad

    Published 2020-06-01
    “…Therefore, a deeper understanding of the impact of regional climate change on production ensures global food security. Wheat is one of the most strategic crops and examining different aspects of its production is a necessity of every agricultural community. …”
    Get full text
    Article
  17. 8597

    Minimum Dietary Diversity Score and Associated Factors among Pregnant Women at Alamata General Hospital, Raya Azebo Zone, Tigray Region, Ethiopia by Kemal Jemal, Mukemil Awol

    Published 2019-01-01
    “…Multivariate analysis revealed that being government employees (AOR = 4.87, CI: 1.70–13.95), merchant (AOR = 4.67, CI: 1.81–12.05), secured food (AOR = 3.85, CI: 2.12–6.97), and eating three meals and above (AOR = 2.66, CI: 1.47–4.82) were significantly associated with high MDDS among pregnant women. …”
    Get full text
    Article
  18. 8598

    Geography of Sand and Gravel Mining in the Lower Mekong River by Jean-Paul Bravard, Marc Goichot, Stéphane Gaillot

    Published 2013-12-01
    “…Currently, the most important issue in the Mekong basin is certainly the threat to the delta coastline because of its importance in terms of food security for the growing populations of Vietnam and Cambodia. …”
    Get full text
    Article
  19. 8599

    Geopolitics of Connectivity: The EU in Central Asia by Sergey V. Mazanik, Tatiana A. Romanova

    Published 2024-12-01
    “…First, critical geopolitics will be operationalized with an emphasis on analytical categories such as discourse, hegemony, identity and ontological security. Thereafter, drawing upon the long-standing academic tradition of considering the EU as a geopolitical actor, the paper clarifies how, under the sway of the ongoing debate on strategic sovereignty (autonomy), the EU deploys the logic of inclusion and exclusion in its relations with third countries. …”
    Get full text
    Article
  20. 8600

    Addressing technology-mediated stigma in sexual health-related digital platforms: Insights from design team members. by Abdul-Fatawu Abdulai, Amanda Fuchsia Howard, Paul J Yong, Leanne M Currie

    Published 2025-02-01
    “…., pop-up notifications, infographics, and video-based testimonials, and avoiding the use of cookies or other security-risk features) and non-functional design considerations (i.e., adopting an interprofessional and collaborative approach to design, educating software designers on domain knowledge about stigma, and ensuring consistent user testing of content). …”
    Get full text
    Article