Showing 1,821 - 1,840 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 1821

    Criminological examination of law acts and their drafts in the system of measures to combat corruption crime in the security and defense sector of Ukraine by I. S. Polyakov

    Published 2024-12-01
    “…The article is devoted to the study of the essence, purpose of criminological examination of regulatory legal acts and their drafts as a tool for combating corruption crime in the security and defense sector of Ukraine. A narrow and broad understanding of the specified examination is proposed. …”
    Get full text
    Article
  2. 1822

    Secured DICOM medical image transition with optimized chaos method for encryption and customized deep learning model for watermarking by R. Abirami, C. Malathy

    Published 2025-04-01
    “…For healthcare professionals to view patient medical images, a secure online transmitting technique is essential. …”
    Get full text
    Article
  3. 1823
  4. 1824

    Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2X by Yinghui ZHANG, Jiale QIAN, Jin CAO, Dong ZHENG

    Published 2023-08-01
    “…Aiming at the efficiency issue of handover authentication for a large number of vehicles in the 5G-V2X scenario, a secure and efficient group handover authentication protocol based on trajectory prediction was proposed.Firstly, the effect of completing key agreement protocol in advance was achieved by predicting vehicle trajectories.Secondly, vehicles with mobility relevance were treated as the same group through user grouping algorithms, and then all vehicles within the group were batch verified using certificateless aggregation signature technology.In addition, to address the vulnerability of aggregated signature technology to DoS attacks, a binary search method was used to quickly locate malicious users and improve the efficiency of group handover authentication protocol.Finally, the security analysis of the protocol was conducted using the formal verification tool Scyther, and compared with the existing optimal protocol, the computational efficiency is improved by 30%.…”
    Get full text
    Article
  5. 1825
  6. 1826
  7. 1827
  8. 1828

    Exploring South Africa’s Foreign Policy Objectives in the Decolonisation of the Intergovernmental Organisations: The Case of the United Nations Security Council by Thoriso Ntlailane, Costa Hofisi

    Published 2024-10-01
    “…The United Nations (UN), which is the largest intergovernmental organization (INGO), has a structure mainly focused on global security which is the United Nations Security Council (UNSC). …”
    Get full text
    Article
  9. 1829

    Blockchain-Powered Secure and Scalable Threat Intelligence System With Graph Convolutional Autoencoder and Reinforcement Learning Feedback Loop by Mohamad Khayat, Ezedin Barka, Mohamed Adel Serhani, Farag Sallabi, Khaled Shuaib, Heba M. Khater

    Published 2025-01-01
    “…This paper proposes an approach that integrates secure blockchain technology with data preprocessing, deep learning, and reinforcement learning to enhance threat detection and response capabilities. …”
    Get full text
    Article
  10. 1830
  11. 1831

    Crayfish optimization based pixel selection using block scrambling based encryption for secure cloud computing environment by Vikas K. Soman, V. Natarajan

    Published 2025-01-01
    “…However, ensuring a high level of security in CC environments remains a significant challenge. …”
    Get full text
    Article
  12. 1832
  13. 1833

    Wireless sensor security communication and anti-leak locating technology based on region partition in power mobile inspection by Min XU, Lin PENG, Haiyun HAN, Nige LI, Zhansheng HOU

    Published 2016-02-01
    “…In order to solve the problem of low transmission efficiency and security of the grid,ensure the normal operation of power network,reduce network burden and improve the security of system access,a secure communication and private key location technology of wireless sensor based on region partition was designed by using the technology of time synchronization verification. …”
    Get full text
    Article
  14. 1834
  15. 1835
  16. 1836
  17. 1837
  18. 1838

    Intelligent classification of computer vulnerabilities and network security management system: Combining memristor neural network and improved TCNN model. by Zhenhui Liu

    Published 2025-01-01
    “…To enhance the intelligent classification of computer vulnerabilities and improve the efficiency and accuracy of network security management, this study delves into the application of a comprehensive classification system that integrates the Memristor Neural Network (MNN) and an improved Temporal Convolutional Neural Network (TCNN) in network security management. …”
    Get full text
    Article
  19. 1839
  20. 1840