Showing 2,521 - 2,540 results of 5,943 for search '"securities"', query time: 0.11s Refine Results
  1. 2521

    WESTERN BALKANS U. S. POLICY IN THE CONTEXT OF THE PRESIDENT TRUMP’S GRAND STRATEGY by Dragan Simić, Dragan Živojinović

    Published 2019-11-01
    “…Many critics of Donald Trump argue that Donald Trump’s Grand Strategy is an absence of Grand Strategy or that his foreign and security policy is driven by impulses and tactical approach. …”
    Get full text
    Article
  2. 2522

    TERRORISM AND POLITICS IN NIGERIA by MUHAMMED GADDAFI YUSUF

    Published 2023-12-01
    “…It concludes by highlighting the imperative for a multidimensional approach to address these complexities and collaboratively work towards a more secure and peaceful Nigeria. …”
    Get full text
    Article
  3. 2523

    Reconceptualizing Corruption as an International Crime: A Review of International Law by Satria Unggul Wicaksana Prakasa

    Published 2024-10-01
    “…The discourse surrounding corruption as an international crime is increasingly urgent, as it transcends national borders and contributes to economic crises, conflicts, and various crimes that threaten global security. Scholars such as Christensen (2017), Peters (2018), Davis (2018), and Rothe (2010) have linked corruption to human rights violations, revealing that states often struggle to address it effectively. …”
    Get full text
    Article
  4. 2524

    SQLite Encryption Method for Embedded Databases Based on Chaos Algorithm by Junlong Shi

    Published 2023-01-01
    “…It is an important topic in the field of information security at present, and it is an effective way to apply to embedded systems. …”
    Get full text
    Article
  5. 2525
  6. 2526

    A Novel Algorithm for Defending Path-Based Denial of Service Attacks in Sensor Networks by Ramzi Saifan, Omar Al-Jarrah

    Published 2010-12-01
    “…Existing end-to-end security mechanisms are vulnerable to path-based denial of service attacks (PDoS). …”
    Get full text
    Article
  7. 2527

    Evolutionary Game and Numerical Simulation of Cultivated Land Protection Policies Implementation in China by Xinhai Lu, Yanwei Zhang, Yucheng Zou

    Published 2021-01-01
    “…The effective implementation of cultivated land protection policies (CLPP) has important practical significance for improving China’s food security and ecological security. The central government, local governments, and farmers have mutually restricted and influencing interest relations. …”
    Get full text
    Article
  8. 2528
  9. 2529

    Analysis and Enhancement of a Password Authentication and Update Scheme Based on Elliptic Curve Cryptography by Lili Wang

    Published 2014-01-01
    “…Finally, we compare our enhancement with related works to illustrate that the improvement is more secure and robust, while maintaining low performance cost.…”
    Get full text
    Article
  10. 2530
  11. 2531

    DIAGNOSTIC EVALUATION OF URBAN METRO TRANSIT SYSTEM POST-COVID-19 by Salman KHURSHEED, Shagufta YASMIN

    Published 2024-09-01
    “…The survey covers commuter perceptions of safety & security, financial & economic factors, infrastructure & comfort and functional & operational features. …”
    Get full text
    Article
  12. 2532

    Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks by Hae Young Lee

    Published 2015-01-01
    “…The existing solutions are vulnerable to such a type of security attacks, called manipulated compilation attacks (MCAs), since they assume that CHs are uncompromised. …”
    Get full text
    Article
  13. 2533

    Second-degree branch structure blockchain expansion model by Qiang Liu, Baoyan Song, Junlu Wang

    Published 2022-03-01
    “…Finally, a set of malicious attacks is simulated to realize the security constraints of the blockchain, to verify the security of the second-degree branch chain model. …”
    Get full text
    Article
  14. 2534

    DEMOCRACY AND THE FIGHT AGAINST LEADERSHIP CORRUPTION IN SUB-SAHARAN AFRICA: IMPLICATION FOR CONTINENTAL DEVELOPMENT by TAIWO FRANCIS AYOMOBA

    Published 2024-08-01
    “… This paper examines democracy and the fight against leadership corruption in relation to Africa and its implication on development and security issues using a qualitative data gathering and analysis method. …”
    Get full text
    Article
  15. 2535

    A Comprehensive Investigation of Fraud Detection Behavior in Federated Learning by Sun Rui

    Published 2025-01-01
    “…By addressing these challenges, FL can offer scalable, secure solutions for real-time fraud detection, ensuring the protection of sensitive financial data while enhancing detection accuracy across diverse data sources.…”
    Get full text
    Article
  16. 2536

    From threat to response: Cybersecurity evolution in Albania by Klorenta PASHAJ, Vilma TOMÇO, Eralda GJIKA

    Published 2025-01-01
    “…The focus is on how Albania has tailored its strategic responses to enhance digital resilience and national security. In the second part, the paper provides an in-depth review of the threat models prevalent in the Western Balkans and Albania, highlighting key areas where Albania's cyber management requires further development. …”
    Get full text
    Article
  17. 2537

    GLONASS AS A TOOL TO ENSURE THE SAFETY OF TRANSPORTATION OF DANGEROUS GOODS by A. Ochkalova

    Published 2016-05-01
    “…The article describes the definition of dangerous goods, shows the reasons for the increased control over the transportation of such kind of goods and special security measures, gives the peculiarities of satellite navigation systems, the algorithm of implementation of the global navigation tracking system in practice, and shows a need for further measures to ensure safety transportation of dangerous goods.…”
    Get full text
    Article
  18. 2538

    Historic Abu Ghraib verdict: U.S. Contractor held accountable for torture by Andrea Mølgaard

    Published 2024-01-01
    “…After years of legal battles, three Iraqi survivors of torture in the Abu Ghraib prison have secured justice in a historic victory in U.S. courts. …”
    Get full text
    Article
  19. 2539

    Recessive transition of rural residential land use from the perspective of value co-creation: A case study of Yiwu City, Zhejiang by ZHANG Cong, LONG Hualou, FENG Dedong

    Published 2025-01-01
    “…[Results] (1) Value co-creation of ural residential land follows the process model of “value consensus-value execution-value win-win” and the operational paradigm of “subject interaction - capacity embedding - benefit sharing”, driving the “element integration - structure reorganization - function optimization” of rural residential land use system, resulting in the dynamic evolution of diverse values such as residential security, economic property, production and operation, ecological protection, and cultural inheritance, and achieving the recessive rural residential land use transition. (2) Yiwu’s practice path of guiding multiple stakeholders to interact collaboratively, constructing “value consensus” for rural residential land, driving with multiple forces, and implementing “value execution” for rural residential land through multi-dimensional rule interaction is a successful model for realizing the recessive rural residential land use transformation through value co-creation. (3) Through the practice of value co-creation, Yiwu has achieved a transformation of the functional value of rural residential land from residential security orientation to economic property orientation, and then to a comprehensive and coordinated approach that encompasses residential security, production and operation, economic assets, and ecological protection, etc. …”
    Get full text
    Article
  20. 2540

    Averting War in Northeast Asia: A Proposal by Mel Gurtov

    Published 2011-01-01
    “…The most critical need of countries in Northeast Asia is an institution for crisis prevention, crisis management, and other security-promoting purposes-what might be called a Northeast Asia Security Dialogue Mechanism (NEASDM). …”
    Get full text
    Article