Showing 1,681 - 1,700 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 1681

    Determinants of food security indicators in Bahir Dar City, Ethiopia: a focus on female-headed households by Getenet Ewunetu Tegegne, Arega Bazezew Berlie, Demsew Mengistie, Abiy Yigzaw

    Published 2025-01-01
    “…This study aims to identify the determinants of food security among female-headed households across three sub-cities and six kebele administrations in Bahir Dar. …”
    Get full text
    Article
  2. 1682
  3. 1683

    Towards Secure Internet of Things: A Coercion-Resistant Attribute-Based Encryption Scheme with Policy Revocation by Yuan Zhai, Tao Wang, Yanwei Zhou, Feng Zhu, Bo Yang

    Published 2025-01-01
    “…Moreover, the scheme employs attribute-based encryption to secure IoT data, enabling fine-grained access control and dynamic user access management, providing a secure and flexible solution for vast IoT data. …”
    Get full text
    Article
  4. 1684
  5. 1685

    Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks by Jiaqi Liang, Yibei Wu, Jun’e Li, Xiong Chen, Heqin Tong, Ming Ni

    Published 2021-01-01
    “…First, we analyze the security threats faced by industrial controllable load, civil controllable load, and the gains and losses of attacks on the distribution networks. …”
    Get full text
    Article
  6. 1686

    Autonomous security analysis and penetration testing model based on attack graph and deep Q-learning network by Cheng FAN, Guoqing HU, Taojie DING, Zhanhua ZHANG

    Published 2023-12-01
    “…With the continuous development and widespread application of network technology, network security issues have become increasingly prominent.Penetration testing has emerged as an important method for assessing and enhancing network security.However, traditional manual penetration testing methods suffer from inefficiency,human error, and tester skills, leading to high uncertainty and poor evaluation results.To address these challenges, an autonomous security analysis and penetration testing framework called ASAPT was proposed, based on attack graphs and deep Q-learning networks (DQN).The ASAPT framework was consisted of two main components:training data construction and model training.In the training data construction phase, attack graphs were utilized to model the threats in the target network by representing vulnerabilities and possible attacker attack paths as nodes and edges.By integrating the common vulnerability scoring system (CVSS) vulnerability database, a “state-action”transition matrix was constructed, which depicted the attacker’s behavior and transition probabilities in different states.This matrix comprehensively captured the attacker’s capabilities and network security status.To reduce computational complexity, a depth-first search (DFS) algorithm was innovatively applied to simplify the transition matrix, identifying and preserving all attack paths that lead to the final goal for subsequent model training.In the model training phase, a deep reinforcement learning algorithm based on DQN was employed to determine the optimal attack path during penetration testing.The algorithm interacted continuously with the environment, updating the Q-value function to progressively optimize the selection of attack paths.Simulation results demonstrate that ASAPT achieves an accuracy of 84% in identifying the optimal path and exhibits fast convergence speed.Compared to traditional Q-learning, ASAPT demonstrates superior adaptability in dealing with large-scale network environments, which could provide guidance for practical penetration testing.…”
    Get full text
    Article
  7. 1687
  8. 1688
  9. 1689
  10. 1690

    A secure and robust color image watermarking method using SVD and GAT in the multiresolution DCHWT domain by Boubakeur Latreche, Hilal Naimi, Slami Saadi

    Published 2023-11-01
    “…In this approach, the pre-processing phase employs successive generalized Arnold transforms to encrypt the RGB watermark layers, significantly enhancing the security of the watermarking algorithm. Subsequently, the blue layer of the host image undergoes R-level 2D-DCHWT processing. …”
    Get full text
    Article
  11. 1691
  12. 1692

    Blockchain-Assisted Hierarchical Attribute-Based Encryption Scheme for Secure Information Sharing in Industrial Internet of Things by A. Sasikumar, Logesh Ravi, Malathi Devarajan, A. Selvalakshmi, Abdulaziz Turki Almaktoom, Abdulaziz S. Almazyad, Guojiang Xiong, Ali Wagdy Mohamed

    Published 2024-01-01
    “…The analyses and experimental findings show that the proposed blockchain-integrated edge computing architecture is better than the existing schemes in terms of data sharing, data privacy, and security.…”
    Get full text
    Article
  13. 1693

    Application of Image Denoising Method Based on Two-Way Coupling Diffusion Equation in Public Security Forensics by Yiqun Wang, Changpeng He, Zhenjiang Li

    Published 2021-01-01
    “…The problem of diversification of the use and application modes of multiple police types is solved; the video image evidence is managed in a centralized storage, audit, and export method, and the security and authenticity of the evidence are solved. …”
    Get full text
    Article
  14. 1694

    Systems Thinking Safety Analysis: Nuclear Security Assessment of Physical Protection System in Nuclear Power Plants by Tae Ho Woo

    Published 2013-01-01
    “…The dynamical assessment has been performed in the aspect of the nuclear power plants (NPPs) security. The physical protection system (PPS) is constructed by the cyber security evaluation tool (CSET) for the nuclear security assessment. …”
    Get full text
    Article
  15. 1695
  16. 1696

    Temporal Convolutional Network Approach to Secure Open Charge Point Protocol (OCPP) in Electric Vehicle Charging by Ikram Benfarhat, Vik Tor Goh, Chun Lim Siow, Muhammad Sheraz, Teong Chee Chuah

    Published 2025-01-01
    “…Securing data transactions across computer networks presents significant challenges, particularly concerning data privacy and cybersecurity threats. …”
    Get full text
    Article
  17. 1697

    Singapore Government Securitization Measures against Transboundary Haze Pollution as a Non-Traditional Security Threat by Muhammad Ramli

    Published 2025-01-01
    “…It can be inferred that the government possesses complete authority to secure the smog issue. The community's response is critical in determining the success of haze securitization. …”
    Get full text
    Article
  18. 1698

    Research and application of 5G cloud-network-edge-end integrated in-depth security protection system by Guoxin ZHANG

    Published 2022-10-01
    “…A 5G cloud-network-edge-end integrated in-depth security protection implementation scheme was innovatively proposed, the network security protection system of 5G customized network was explored, and the basic architecture, characteristics, implementation scheme and application effect of the system were introduced.In the implementation plan, two key points were emphasized.Firstly, by deploying the security system of the four aspects of the 5G cloud network, the edge and the end, the multi-level and multi-dimensional security protection capability was formed.Secondly, the operation process of the adaptation system, including one-key reinforcement, security defense, situational awareness and one-key emergency response was established.Finally, the practical application effect of the 5G cloud-network-edge-end integrated in-depth security protection system was given.…”
    Get full text
    Article
  19. 1699

    An explanatory case report about critical differences of ‘inability to work’ in Italian welfare and social security systems by Michele Sammicheli, Marcella Scaglione

    Published 2019-03-01
    “…In Italy, there is a different status of ‘inability to work’ in civil invalidity and INPS social security insurance systems. These differences and overlaps cause some concerns. …”
    Get full text
    Article
  20. 1700