Showing 1,041 - 1,060 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 1041

    Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review by Sufian Hameed, Faraz Idris Khan, Bilal Hameed

    Published 2019-01-01
    “…On the contrary, IoT has various security and privacy concerns for the end users that limit its proliferation. …”
    Get full text
    Article
  2. 1042
  3. 1043

    Access control security model based on behavior in cloud computing environment by Guo-yuan LIN, Shan HE, Hao HUANG, Ji-yi WU, Wei CHEN

    Published 2012-03-01
    “…In view of the current popular cloud computing technology,some security problems were analyzed.Based on BLP(Bell-LaPadula) model and Biba model,using the access control technology based on behavior to dynamic adjusting scope of subject's visit,it put forward the CCACSM ( cloud omputing access control security model).The model not only guarantees the cloud computing environment information privacy and integrity,and makes cloud computing environment with considerable flexibility and practical.At last,it gives the model's part,safety justice and realization process.…”
    Get full text
    Article
  4. 1044
  5. 1045
  6. 1046

    Predictive Policing and Enhancing Security Performance through Artificial Intelligence Applications by Bensalem Kheira

    Published 2024-12-01
    “…This paper stress the importance of leveraging predictive technologies to foster preparedness, resilience, and security in an increasingly interconnected world. By modernizing infrastructures and embracing AI-driven strategies, nations can navigate the complexities of the digital era effectively, paving the way for sustainable progress and global stability.…”
    Get full text
    Article
  7. 1047
  8. 1048
  9. 1049
  10. 1050

    Secure Pesticide Storage: Using and Managing a Pesticide Storage Facility by Thomas W. Dean

    Published 2004-10-01
    “…Revised: November 2004.  PI33/PI068: Secure Pesticide Storage: General Features (ufl.edu) …”
    Get full text
    Article
  11. 1051

    Synchronization of chaotic optomechanical system with plasmonic cavity for secured quantum communication by Mulubirhan Dangish, Abebe Belay Gemta, Alemayehu Getahun Kumela, Umer Sherefedin, Ruth Birhanu

    Published 2025-01-01
    “…Our findings pave the way for enhanced coherence and reliability in secure quantum communication systems, thus contributing to the advancement of this rapidly evolving field.…”
    Get full text
    Article
  12. 1052
  13. 1053
  14. 1054
  15. 1055
  16. 1056

    A Secure Image Encryption Algorithm Based on Rubik's Cube Principle by Khaled Loukhaoukha, Jean-Yves Chouinard, Abdellah Berdai

    Published 2012-01-01
    “…These encryption algorithms typically use relatively small key spaces and thus offer limited security, especially if they are one-dimensional. In this paper, we proposed a novel image encryption algorithm based on Rubik's cube principle. …”
    Get full text
    Article
  17. 1057
  18. 1058
  19. 1059
  20. 1060