Showing 1,181 - 1,200 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 1181
  2. 1182
  3. 1183

    A Game-Based Secure Localization Algorithm for Mobile Wireless Sensor Networks by Tianyue Bao, Jiangwen Wan, Kefu Yi, Qiang Zhang

    Published 2015-09-01
    “…To address these challenges, the paper presents a novel game-based secure localization algorithm. The nodes' strategy level can be indicated through the results of trust evaluation and then by means of constructing reasonable strategy space and payoff function using game theory; all kinds of nodes within the network can achieve the optimal payoffs. …”
    Get full text
    Article
  4. 1184
  5. 1185
  6. 1186
  7. 1187

    Strategic autonomy of Russia in the changing international environment and consequences for the regional security of the Balkans by Proroković Dušan

    Published 2024-01-01
    “…The aim of the research is to analyze the realization of Russia's strategic autonomy by applying the concept of extended deterrence for the regional security of the Balkans. For this, the methods of discourse analysis (direction of Russian policy) and content analysis (individual strategic documents and statements of representative officials), case studies (Balkan regional framework) and synthesis are used. …”
    Get full text
    Article
  8. 1188
  9. 1189

    A Secure Cooperative Spectrum Sensing Scheme in Mobile Cognitive Radio Networks by Jun Du, Daoxing Guo, Bangning Zhang, Ligang Shang

    Published 2014-06-01
    “…However, in existing works, the problem of secure CSS in mobile cognitive radio networks (CRNs) has not been well considered yet. …”
    Get full text
    Article
  10. 1190
  11. 1191
  12. 1192

    Application of security threat intelligence based on big data analysis in telecom operators by Mingxia BO, Hongyu TANG, Chen MA, Jian ZHANG

    Published 2020-11-01
    “…As a powerful tool for operators to deal with means of new attack and ever-changing security threats,threat intelligence is also the core power to transform traditional passive defense into active defense.The importance of threat intelligence to operators was introduced,the productive process of threat intelligence was analyzed in detail,and finally the typical application scenarios of threat intelligence were given,which could provide technical reference for telecom operators in the practice of threat intelligence.…”
    Get full text
    Article
  13. 1193
  14. 1194

    Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges by Mohammad Faisal, Ikram Ali, Muhammad Sajjad Khan, Junsu Kim, Su Min Kim

    Published 2020-01-01
    “…Further different issues related specifically to the Internet of Things environment are discussed and the causes and effects pertaining to the security breach for Internet of Things are identified. …”
    Get full text
    Article
  15. 1195

    Investigating the security consequences of climate change on Iran with a Good Governance approach by Parisa ghorbani sepehr, Zaki Yashar, Seyed abbas ahmadi

    Published 2024-12-01
    “…Due to its location in low latitudes, Iran is among the countries that has not been spared from the security consequences of climate change. The present study seeks to answer two questions: 1) What are the security consequences of climate change on Iran and which components have the greatest impact on Iran? …”
    Get full text
    Article
  16. 1196
  17. 1197
  18. 1198

    Novel Framework for Secure Data Aggregation in Precision Agriculture with Extensive Energy Efficiency by G. S. Nagaraja, K. Vanishree, Farooque Azam

    Published 2023-01-01
    “…Energy-efficient data transmission in PA via sensing technology is possible only when additional security measures are synchronized. Nevertheless, security considerations often introduce additional overhead. …”
    Get full text
    Article
  19. 1199

    A Quantitative Risk Evaluation Model for Network Security Based on Body Temperature by Y. P. Jiang, C. C. Cao, X. Mei, H. Guo

    Published 2016-01-01
    “…These days, in allusion to the traditional network security risk evaluation model, which have certain limitations for real-time, accuracy, characterization. …”
    Get full text
    Article
  20. 1200