Showing 1,641 - 1,660 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 1641
  2. 1642

    Multi-hop broadcast message dissemination in vehicular ad hoc networks: A security perspective review by Alejandro Galaviz-Mosqueda, Miguel Morales-Sandoval, Salvador Villarreal-Reyes, Hiram Galeana-Zapién, Raúl Rivera-Rodríguez, Miguel Ángel Alonso-Arévalo

    Published 2017-11-01
    “…Among these issues, those related to security are of particular importance. In this article, the main security issues of broadcast message dissemination in vehicular ad hoc networks are discussed. …”
    Get full text
    Article
  3. 1643
  4. 1644

    N − 1 Security Criteria Based Integrated Deterministic and Probabilistic Framework for Composite Power System Reliability by Tanmay Jain, Kusum Verma, Mahendra Bhadu

    Published 2024-01-01
    “…In this paper, N − 1 security criteria based reliability of the composite power system (CPS) is proposed using an integrated deterministic and probabilistic framework (D-P) considering outage of the transmission line. …”
    Get full text
    Article
  5. 1645
  6. 1646
  7. 1647

    Theorizing International Politics of Research, Science, and Technology: Implications for Global Governance, National Security, and Economic Growth by Julius Adinoyi

    Published 2023-07-01
    “… This article examines the value of understanding the international politics surrounding research, science and technology (RST) in today‟s world.It encompasses intricate connections between nations, international organizations, and multinational enterprises,which is essential for economic growth, social development, and national security.The significance of elements like anarchy, capitalism, welfare, and security that influences the global politics of RST is highlighted in the essay.In order to counteract technology misuse, the authors stress the significance of establishing ethical standards. …”
    Get full text
    Article
  8. 1648
  9. 1649

    A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks by Sang Guun Yoo, Hyukjun Lee, Juho Kim

    Published 2013-05-01
    “…However, they have serious limitations in terms of security and usability. First, even though they are enhancements of other works, they still have several security flaws, such as vulnerability against parallel session, privileged-insider, and gateway-node bypassing attacks and lack of mutual authentication between user station and gateway node. …”
    Get full text
    Article
  10. 1650
  11. 1651

    End-Edge Collaborative Lightweight Secure Federated Learning for Anomaly Detection of Wireless Industrial Control Systems by Chi Xu, Xinyi Du, Lin Li, Xinchun Li, Haibin Yu

    Published 2024-01-01
    “…With the wide applications of industrial wireless network technologies, the industrial control system (ICS) is evolving from wired and centralized to wireless and distributed, during which eavesdropping and attacking become serious problems. To guarantee the security of wireless and distributed ICS, this article establishes an end-edge collaborative lightweight secure federated learning (LSFL) architecture and proposes an LSFL anomaly detection strategy. …”
    Get full text
    Article
  12. 1652

    A Blockchain-Assisted Federated Learning Framework for Secure and Self-Optimizing Digital Twins in Industrial IoT by Innocent Boakye Ababio, Jan Bieniek, Mohamed Rahouti, Thaier Hayajneh, Mohammed Aledhari, Dinesh C. Verma, Abdellah Chehri

    Published 2025-01-01
    “…Optimizing digital twins in the Industrial Internet of Things (IIoT) requires secure and adaptable AI models. The IIoT enables digital twins, virtual replicas of physical assets, to improve real-time decision-making, but challenges remain in trust, data security, and model accuracy. …”
    Get full text
    Article
  13. 1653
  14. 1654
  15. 1655

    Recent advancements in durable and self-healing oil well cement: A pathway to secure carbon sequestration by Yan Xie, Michelle Tiong, Qi Liu, Tong Wu, Wanzhen Xue, Chunkai Wang

    Published 2025-02-01
    “…The integrity of the cement sheath in storage wells is essential to secure the subsurface CO2 storage, however, acidic CO2 can erode the cement sheath over time, leading to chemical and mechanical damages of cement, risking CO2 leakage. …”
    Get full text
    Article
  16. 1656

    Efficient and secure attribute-based heterogeneous online/offline signcryption for body sensor networks based on blockchain by Jawaid Iqbal, Arif Iqbal Umar, Noorul Amin, Abdul Waheed

    Published 2019-09-01
    “…Moreover, hybrid blockchain provides advantages of interoperability, transparency traceability, and universal access. The formal security analysis of the proposed scheme is proved in the standard model, and informal security assures that our scheme provides resistance against possible attacks. …”
    Get full text
    Article
  17. 1657

    SYNERGY BETWEEN THE YOUTH AND A SECURED NATION: AN ATTEMPT TO DEVELOP NIGERIA THROUGH POLITICS AND ELECTORAL REMINISCENCE by ABDULKAREEM ONAKOYA

    Published 2024-05-01
    “…The study thereby recommends that; godliness, provision of employment opportunities by the government, secured borders, good parental care etc will improve on the security state of the nation. …”
    Get full text
    Article
  18. 1658

    Enhancing Secure Medical Data Communication Through Integration of LSB and DCT for Robust Analysis in Image Steganography by Ramyashree, P. S. Venugopala, S. Raghavendra, Vijay S. Kubihal

    Published 2025-01-01
    “…Steganography enhances data security by embedding information seamlessly within digital channels. …”
    Get full text
    Article
  19. 1659
  20. 1660

    2003 Handbook of Employment Regulations Affecting Florida Farm Employers and Workers: Social Security and Medicare [Federal] by Leo C. Polopolus, Michael T. Olexa, Fritz Roka, Carol Fountain

    Published 2003-07-01
    “… The purpose of Social Security and Medicare is to provide social benefits to qualified workers who retire, become disabled, and/or require medical assistance. …”
    Get full text
    Article