Showing 1,301 - 1,320 results of 9,720 for search '"Securities ', query time: 0.10s Refine Results
  1. 1301
  2. 1302
  3. 1303
  4. 1304

    Brain activity patterns reflecting security perceptions of female cyclists in virtual reality experiments by Mohammad Arbabpour Bidgoli, Arian Behmanesh, Navid Khademi, Phromphat Thansirichaisree, Zuduo Zheng, Sara Saberi Moghadam Tehrani, Sajjad Mazloum, Sirisilp Kongsilp

    Published 2025-01-01
    “…Existing literature highlights that women’s willingness to use bicycles is significantly influenced by their perception of security. This study employs virtual reality (VR) cycling simulation and electroencephalography (EEG) analysis to investigate factors influencing female cyclists’ perceptions of security in Tehran. …”
    Get full text
    Article
  5. 1305

    CS-FL: Cross-Zone Secure Federated Learning with Blockchain and a Credibility Mechanism by Chongzhen Zhang, Hongye Sun, Zhaoyu Shen, Dongyu Wang

    Published 2024-12-01
    “…To address these challenges, this paper proposes a cross-zone secure federated learning method with blockchain and credibility mechanism, named CS-FL. …”
    Get full text
    Article
  6. 1306

    Adaptive Conflict-Free Optimization of Rule Sets for Network Security Packet Filtering Devices by Andrea Baiocchi, Gianluca Maiolini, Annachiara Mingo, Daniele Goretti

    Published 2015-01-01
    “…Packet filtering and processing rules management in firewalls and security gateways has become commonplace in increasingly complex networks. …”
    Get full text
    Article
  7. 1307
  8. 1308

    Enhanced Image Security through 4D Hyperchaotic System and Hybrid Key Techniques by Muhammad Naufal Erza Farandi, Sri Winarno, Zahrah Asri Nur Fauzyah

    Published 2024-11-01
    “…This study develops a digital image encryption method using a 4D hyperchaotic system combined with a hybrid key to maximize data security. By generating a random and uniform pixel distribution, the method makes decryption significantly harder for unauthorized access. …”
    Get full text
    Article
  9. 1309

    An investigation of feature reduction, transferability, and generalization in AWID datasets for secure Wi-Fi networks. by Nashmia Khalid, Sadaf Hina, Khurram Shabih Zaidi, Tarek Gaber, Lee Speakman, Zainab Noor

    Published 2025-01-01
    “…The practical implications of this research are crucial for the secure automation of wireless intrusion detection frameworks and tools in personal and enterprise paradigms.…”
    Get full text
    Article
  10. 1310
  11. 1311
  12. 1312

    Secure hidden keyword searchable encryption schemewith fine-grained and flexible access control by Yang YANG, Bo-gang LIN, Mao-de MA

    Published 2013-08-01
    “…Moreover, the suggested system has the function to add and revoke user. Security analysis shows that the scheme could not only prevent the leakage of private data but also hide the information of keywords. …”
    Get full text
    Article
  13. 1313
  14. 1314

    Information acquisition strategy for security gate-ways based on swing door trending algorithm by Shuang WANG, Yueming LU

    Published 2018-10-01
    “…Acquisition the control information of security gateway is an important security awareness method in the space and earth integrated network,but the traditional equal interval time data method acquisition has problems,such as waste of network bandwidth,a large amount of data redundancy,excessive data collection of acquisition node and excessive transmission times.In order to solve these problems,a data acquisition strategy based on improved swing door trending algorithm was proposed,which analyzed and improved swing door trending algorithm to determine the control information of security gateway such as the rangeability of gateway traffic and CPU utilization,and to adjust the data acquisition interval adaptively.The experimental results show that compared with the traditional equal interval time data method acquisition,under the condition of ensuring the data accuracy,the proposed strategy can lower the times of data acquisition and transmission,effectively reduce network overhead and improve data acquisition efficiency.…”
    Get full text
    Article
  15. 1315

    Introducing maximum sustainable yield targets in fisheries could enhance global food security by Christian Elleby, Ignacio Pérez Domínguez, Rasmus Nielsen, Max Nielsen, Ayoe Hoff

    Published 2025-01-01
    “…Abstract Aquatic foods are crucial for global food and nutrition security, but overfishing has led to depleted fish stocks, threatening both food security and the environment. …”
    Get full text
    Article
  16. 1316
  17. 1317
  18. 1318
  19. 1319
  20. 1320