Showing 1,441 - 1,460 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 1441

    Secure Event-Triggered Mechanism for Networked Control Systems under Injection Cyber-Attacks by Xiao Cai, Jian Kang, Kaibo Shi

    Published 2022-01-01
    “…This study focuses on the secure stability issue of networked control systems (NCSs) under injection cyber-attacks (ICAs), which have important research value of applications for network security. …”
    Get full text
    Article
  2. 1442
  3. 1443
  4. 1444
  5. 1445
  6. 1446

    Evaluation, Energy Optimization, and Spectrum Analysis of an Artificial Noise Technique to Improve CWSN Security by Javier Blesa, Alvaro Araujo, Elena Romero, Octavio Nieto-Taladriz

    Published 2013-06-01
    “…This paper presents the security evaluation, energy consumption optimization, and spectrum scarcity analysis of artificial noise techniques to increase physical-layer security in Cognitive Wireless Sensor Networks (CWSNs). …”
    Get full text
    Article
  7. 1447

    Security protection method based on mimic defense and Paillier encryption for smart IoT terminals by GU Tiansheng, ZENG Fukang, SHAO Sisi, NIE Yijun, JI Zongkai, ZHENG Yulu, SHI Yuchen, LIU Shangdong, JI Yimu

    Published 2024-12-01
    “…In particular, the endogenous security and secure transmission issues faced by IoT edge-area smart terminals, due to uncertain threats like unknown vulnerabilities and backdoors, are of considerable concern in the realm of smart IoT. …”
    Get full text
    Article
  8. 1448

    Finnish and Swedish NATO membership: A path towards more regional security or instability? by Filipović Aleksa

    Published 2024-01-01
    “…With the ascension of both Finland and Sweden to NATO, the Scandinavian and Baltic regions are facing the restructuring of the security architecture that can lead either toward more regional security or instability. …”
    Get full text
    Article
  9. 1449

    Chaotic Stream Cipher-Based Secure Data Communications over Intelligent Transportation Network by Wei Zhang, Shanyu Tang, Liping Zhang, Zhao Ma, Jun Song

    Published 2015-01-01
    “…To address the above security problems, we proposed a chaotic stream cipher-based cryptographic scheme to realise secure data communications over wireless sensor network (WSN), which is a part of ITS. …”
    Get full text
    Article
  10. 1450

    Food Acquisition Coping Strategies Vary Based on Food Security Among University Students by Emily Sklar, Gwen M Chodur, Leslie Kemp, Deborah S Fetter, Rachel E Scherr

    Published 2025-01-01
    “…Results: Despite targeted recruitment efforts, 76% of participants were classified as food secure by the United States Department of Agriculture (USDA) Adult Food Security Survey Module (AFSSM). …”
    Get full text
    Article
  11. 1451

    SviaB: Secure and verifiable multi‐instance iris remote authentication using blockchain by Mahesh Kumar Morampudi, Munaga V. N. K. Prasad, Surya Narayana Raju Undi

    Published 2022-01-01
    “…In a malicious server setting, the server may return an arbitrary result to save computational resources, resulting in a false accept/reject. To address this, secure and verifiable multi‐instance iris authentication using blockchain (SviaB) is proposed. …”
    Get full text
    Article
  12. 1452
  13. 1453

    Big data security analysis method based on self-update threat intelligence database by Yanfang HOU, Jinhua WANG

    Published 2018-03-01
    “…Big data security analysis method is generally based on the existing signature database to detect and match malicious behaviors.This method can only detect known attacks and can't analyze and judge new types of unknown attacks and complex variant attacks.Through the big data analysis technology,the collected data was extracted for safety value,and the value conversion from the collected data,threat information,threat knowledge to threat intelligence was realized,high-value threat intelligence of forming hidden,value selective,adversarial,predictive,and decision-making,evidence-based,time-sensitive was formed.Firstly,the limitations of the existing security analysis methods were analyzed.Then the construction method of threat intelligence database was introduced in detail.Finally,the security analysis method of big data based on self-renewing threat information database was described.The analysis of big data security based on the self-updated threat intelligence database could mine the hidden threats in internet data effectively and strengthen the existing security protection capabilities of internet companies so that the preemptive defense initiative could be mastered during the security game.…”
    Get full text
    Article
  14. 1454
  15. 1455
  16. 1456

    Parental involvement in residential child care: helping parents to provide a secure base by Esther M.W. Geurts, Marc J. Noom, Erik J. Knorth

    Published 2011-02-01
    “…This method builds on the idea of secure base and ensures that parents maintain the responsibility for the upbringing of their child and that they have a say in arrangements in the youth care process. …”
    Article
  17. 1457
  18. 1458
  19. 1459

    Low-cost group-based identity security authentication protocol for NB-IoT nodes by Xiangmao CHANG, Jun ZHAN, Zhiwei WANG

    Published 2021-12-01
    Subjects: “…group-based identity security authentication protocol…”
    Get full text
    Article
  20. 1460