Showing 2,581 - 2,600 results of 5,943 for search '"securities"', query time: 0.07s Refine Results
  1. 2581

    Fragilité du géocyberespace à l’heure des conflits cybernétiques by Henry Bakis

    Published 2013-10-01
    “…Despite the urgency of the problem, effective control of Internet security poses real challenges (political, legal and technical). …”
    Get full text
    Article
  2. 2582

    U.S. strategy in Central Asia by V. N. Zemskov

    Published 2013-04-01
    “…In this connection, the author notes that successive governments of the USA, the American political and expert community, business circles traditionally in the last twenty years pay particular attention to this region, bringing to secure the U.S. presence in the region the concept of "Big Central Asia".…”
    Get full text
    Article
  3. 2583
  4. 2584

    Exploring real estate blockchain adoption: An empirical study based on an integrated task-technology fit and technology acceptance model. by Hailan Yang, Zixian Zhang, Chen Jian, Nisar Ahmad

    Published 2025-01-01
    “…The study's findings indicate that attitude, perceived usefulness (PU) and data privacy and security (DPS) exerts highest influence in the proposed theoretical model. …”
    Get full text
    Article
  5. 2585

    Indonesian Defense Diplomacy in Responding to China’s National Interest in South China Sea by Surryanto Djoko Waluyo

    Published 2023-03-01
    “…This study discovered that China’s national interests in the South China Sea center on securing its economic interests and military modernization. …”
    Get full text
    Article
  6. 2586

    FractalNet-based key generation for authentication in Voice over IP using Blockchain by Vajjala Sreenivasulu, Chinthaginjala Ravikumar

    Published 2025-03-01
    “…However, VoIP systems face critical security challenges, including threats to integrity, authenticity, and confidentiality. …”
    Get full text
    Article
  7. 2587

    NIGERIAN AIRFORCE STRATEGIC DEVELOPMENT AND CAPACITY IN THE FOURTH REPUBLIC, 2019-2023 by EFEFIONG ASUQUO EDET, INAH EMMANUEL MKPE, AKPANKE BETIANG JOSEPH

    Published 2024-09-01
    “…This situation has preoccupied the national security forces, including the Airforce which has carried out several operations to address these threats. …”
    Get full text
    Article
  8. 2588

    A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks by Yasmin M. Amin, Amr T. Abdel-Hamid

    Published 2016-01-01
    “…With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. …”
    Get full text
    Article
  9. 2589

    Two-Party Quantum Private Comparison Protocol for Direct Secret Comparison by Min Hou, Yue Wu

    Published 2025-01-01
    “…A simulation on the IBM Quantum Platform demonstrates the protocol’s feasibility, and a security analysis confirms its robustness against potential eavesdropping and participant attacks. …”
    Get full text
    Article
  10. 2590

    THE UTILITY OF EARLY WARNING SYSTEM AND CRIME PREVENTION: A STUDY OF THE ABDUCTION OF SCHOOL CHILDREN IN NIGERIA by OCHOGA EDWIN OCHOGA, AKHANOLU LILIAN NNENNE

    Published 2022-05-01
    “…This is essential for interrogation, as the abduction of school children has become a threat to national security. The paper used qualitative data from secondary literature and conceptualized theories of early warning signs to provide a theoretical base for its argument. …”
    Get full text
    Article
  11. 2591

    Effectiveness of the Spatial Domain Techniques in Digital Image Steganography by Rosshini Selvamani, Yusliza Yusoff

    Published 2024-03-01
    “… Digital steganography is a new and extremely demanding method for transmitting information securely over the internet while employing a covert device. …”
    Get full text
    Article
  12. 2592

    Cyberterrorism: content, forms and promising countermeasures by D. S. Melnyk

    Published 2023-10-01
    “…The counteraction system may be based on the following: proper regulation of the concept of cyber terrorism in national legislation, criminalisation of acts of cyber terrorism and its components; enhancing the security and protection of critical information infrastructure; improving existing and applying new counteraction methods; improving cooperation in the field of combating cyber terrorism.…”
    Get full text
    Article
  13. 2593

    YOUTHS PROTEST IN NIGERIA: THE ENDSARS IN PERSPECTIVE by Felix Ikalewumi

    Published 2022-05-01
    “…However, where neglected, unskilled and lacked the requisite social security in the event of poor governance, low education, poor investment environment and other essential qualities of lives, youths becomeliability, threat and object of national instability to their country. …”
    Get full text
    Article
  14. 2594
  15. 2595

    Functions and Authorities of the Armed Forces of Ukraine on the Crime Scene by Y. V. Grinenko

    Published 2019-12-01
    “…It is emphasized that in order to ensure the implementation of the said functions of the Armed Forces of Ukraine, they have the right to take measures to restore the territorial integrity of Ukraine, as well as to provide comprehensive development of secure, economic, information, telecommunication, social and humanitarian infrastructure on the territories adjacent to the temporarily occupied territories in Donetsk and Luhansk to implement, in accordance with strategic defense planning documents, measures to strengthen defense and security capabilities of the country. …”
    Get full text
    Article
  16. 2596

    Toward sustainable desalination: a patent analysis of technology-development trajectories by Kyungsun Lee, Wendy Jepson

    Published 2025-01-01
    “…Research and development (R&D) in desalination has enabled innovations and expanded global water-supply capacity to enhance water security. Despite increased desalination capacity, significant sustainability concerns persist. …”
    Get full text
    Article
  17. 2597

    TAX CONTROL OF EXPORT OPERATIONS: PROBLEMS, PROSPECTS, SOLUTIONS by Konstantin V. Adolf

    Published 2024-12-01
    “…The implementation of these measures will contribute to improving economic security and the efficiency of the tax system.…”
    Get full text
    Article
  18. 2598
  19. 2599

    Weighted Sum Secrecy Rate Optimization for Cooperative Double-IRS-Assisted Multiuser Network by Shaochuan Yang, Kaizhi Huang, Hehao Niu, Yi Wang, Zheng Chu, Gaojie Chen, Zhen Li

    Published 2024-01-01
    “…In this paper, we present a double-intelligent reflecting surfaces (IRS)-assisted multiuser secure system where the inter-IRS channel is considered. …”
    Get full text
    Article
  20. 2600