Showing 281 - 300 results of 5,943 for search '"securities"', query time: 0.11s Refine Results
  1. 281
  2. 282
  3. 283
  4. 284

    Precision Security: Integrating Video Surveillance with Surrounding Environment Changes by Wenfeng Wang, Xi Chen, Guiwei Zhang, Jing Qian, Peng Wei, Boqian Wu, Hongwei Zheng

    Published 2018-01-01
    “…Video surveillance plays a vital role in maintaining the social security although, until now, large uncertainty still exists in danger understanding and recognition, which can be partly attributed to intractable environment changes in the backgrounds. …”
    Get full text
    Article
  5. 285
  6. 286
  7. 287

    Application of convolutional neural networks in the intelligence security system subsystem by V. S. Demeshko, A. I. Фёдоров

    Published 2020-08-01
    “…The article proposes the structure of an integrated security system for areal facilities. The main subsystems included in its composition are considered. …”
    Get full text
    Article
  8. 288

    Small Arms and Small Countries: Firearms and the International Security Agenda by Carla Álvarez Velasco

    Published 2016-05-01
    “…This article examines the emergence of the small arms trade on the international political agenda as a growing security threat. Employing the theoretical framework proposed by the Copenhagen School, this article argues that the issue of small arms gained traction at the international level in the context of the post-Cold War. …”
    Get full text
    Article
  9. 289

    Container Security Device Chain Network for Safe Railway Transportation by Sungryul Kim, Jeonghyun Kim, Younghwan Yoo

    Published 2014-11-01
    “…This paper suggests the use of the container security devices (CSDs), which has been adopted for the marine transportation so far, to enhance the security of railway freight transportation. …”
    Get full text
    Article
  10. 290
  11. 291
  12. 292
  13. 293
  14. 294
  15. 295

    Cooperative secure transmission against collusive eavesdroppers in Internet of Things by Xin Fan, Yan Huo

    Published 2020-06-01
    “…As Internet of Things (IoT) has boomed in recent years, many security issues have also been exposed. Focusing on physical layer security in wireless Internet of Things network communication, a series of security methods have been widely studied. …”
    Get full text
    Article
  16. 296

    Creating and Implementing an Effective and Deterrent National Cyber Security Strategy by Mustafa Senol, Ertugrul Karacuha

    Published 2020-01-01
    “…This paper presents a new national cyber security strategy (NCSS) covering the deterrence perspective from creation to implementation. …”
    Get full text
    Article
  17. 297

    Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks by Jun-Sub Kim, Jin Kwak

    Published 2013-01-01
    “…Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'…”
    Get full text
    Article
  18. 298
  19. 299

    Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services by Youngsook Lee, Juryon Paik

    Published 2014-01-01
    “…We also show how the security weaknesses of He et al.’s scheme can be addressed without degrading the efficiency of the scheme.…”
    Get full text
    Article
  20. 300