Showing 1,461 - 1,480 results of 9,720 for search '"Securities ', query time: 0.12s Refine Results
  1. 1461
  2. 1462
  3. 1463

    Strategic Health Diplomacy: An Indonesia’s Approach in Securing COVID-19 Booster Vaccine Supplies by Deasy Silvya Sari, Mas Halimah, Akim Akim, Renata Maximillian, Fakhri Sabiq Muawal, Nathanael Jusac Lie

    Published 2024-06-01
    “…This study provides an in-depth analysis of Indonesia’s health diplomacy strategy in securing booster vaccines for COVID-19, a critical component in mitigating the impact of the pandemic. …”
    Get full text
    Article
  4. 1464
  5. 1465
  6. 1466

    Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology by Xiaokun Zheng

    Published 2022-01-01
    “…In order to detect the computer network security technology vulnerabilities due to various factors, the normal operation of the computer network must be ensured, the user’s confidential information must be protected, and it is proposed that the analysis and research on security vulnerability detection must be strengthened. …”
    Get full text
    Article
  7. 1467
  8. 1468
  9. 1469
  10. 1470
  11. 1471
  12. 1472

    Exploring the Integration of Blockchain and Distributed DevOps for Secure, Transparent, and Traceable Software Development by Junaid Nasir Qureshi, Muhammad Shoaib Farooq, Usman Ali, Adel Khelifi, Zabihullah Atal

    Published 2025-01-01
    “…However, it does suffer from a lack of security, transparency, and traceability, which can result in project delays, a lack of trust between stakeholders, and even project failure. …”
    Get full text
    Article
  13. 1473
  14. 1474
  15. 1475
  16. 1476

    Analyzing Rail Traffic Diversion Based on Machine Learning Technique considering Transportation Security by Jing Luo, Dai Zhou, Wenjun Ma, Guohua Zhao

    Published 2022-01-01
    “…Based on a stated preference survey, we comprehensively analyze the travel psychology of residents and the advantages and disadvantages of rail transit and conventional buses, travel time, travel cost, travel security, and vehicle comfort and investigate the relationship between the relevant influencing factors and the transition probability from rail transit to buses. …”
    Get full text
    Article
  17. 1477
  18. 1478

    Implementation of lightweight intrusion detection model for security of smart green house and vertical farm by Jun-Ho Huh

    Published 2018-04-01
    “…Development and implementation of smart green houses and vertical farms are two major solutions for the expected crisis, but as other ICT-based systems, their security problems must be dealt with. Nevertheless, current network forensics is still unable to fully monitor and analyze computer network traffic to gather the evidences of malicious attacks or intrusions. …”
    Get full text
    Article
  19. 1479
  20. 1480

    Charging wireless sensor network security technology based on encryption algorithms and dynamic model by Yuanming Li, Wei Guo, Xuejun Meng, Wen Xia

    Published 2020-02-01
    “…Wireless networks cover all aspects of life, along with it, network security issues have gradually emerged. In recent years, network security vulnerabilities have been exposed continuously, from WiFi to Bluetooth, people gradually realize the security of wireless networks. …”
    Get full text
    Article