Showing 421 - 440 results of 5,943 for search '"securities"', query time: 0.09s Refine Results
  1. 421

    Reinforcement Learning-Based Generative Security Framework for Host Intrusion Detection by Yongsik Kim, Su-Youn Hong, Sungjin Park, Huy Kang Kim

    Published 2025-01-01
    “…Thus, it is indispensable to configure a security system that accurately detects attacks on each user’s system. …”
    Get full text
    Article
  2. 422
  3. 423
  4. 424

    The Development of the US National Missile Defense and its Impact on the International Security by J. Yu. Parshkova

    Published 2015-02-01
    “…The major threat to international security is the proliferation of ballistic missiles and weapons of mass destruction. …”
    Get full text
    Article
  5. 425

    Promoting Agricultural Research and Development to Strengthen Food Security in South Asia by Ghose Bishwajit

    Published 2014-01-01
    “…This study also depicts the current situation of food security in South Asia and illustrates how agricultural education and innovation hold the master key to solve the food security issues for the world's most densely populated region.…”
    Get full text
    Article
  6. 426
  7. 427
  8. 428
  9. 429
  10. 430
  11. 431

    Secure Pesticide Storage: Using and Managing a Pesticide Storage Facility by Thomas W. Dean

    Published 2004-10-01
    “…Revised: November 2004.  PI33/PI068: Secure Pesticide Storage: General Features (ufl.edu) …”
    Get full text
    Article
  12. 432

    A certificateless aggregate signature scheme for security and privacy protection in VANET by Eko Fajar Cahyadi, Tzu-Wei Su, Chou-Chen Yang, Min-Shiang Hwang

    Published 2022-05-01
    “…Unfortunately, some of them still have some security and privacy issues under specific existing attacks. …”
    Get full text
    Article
  13. 433

    Methodology for determining actual threats to information security in medical information system by V. A. Maystrenko, O. A. Bezrodnykh, R. A. Dorokhin

    Published 2021-11-01
    “…Its use also makes it possible to assess the relevance of information security threats for MIS that do not have qualified specialists in the field of information security in the staff of a medical institution, which is relevant for a large number of medical institutions. …”
    Get full text
    Article
  14. 434
  15. 435
  16. 436
  17. 437

    A Novel Computer Virus Propagation Model under Security Classification by Qingyi Zhu, Chen Cen

    Published 2017-01-01
    “…In reality, some computers have specific security classification. For the sake of safety and cost, the security level of computers will be upgraded with increasing of threats in networks. …”
    Get full text
    Article
  18. 438
  19. 439

    Factors of geography and security in the integration construction: the case of East- Asian integration by A. A. Baykov

    Published 2012-12-01
    “…The paper analyzes the impact of geography and security threats on the dynamics and forms of integration cooperation in the area of East Asia. …”
    Get full text
    Article
  20. 440

    Secure Pesticide Storage: Workspace Features of a Pesticide Storage Facility by Thomas W. Dean

    Published 2004-10-01
    “… This document identifies and discusses three key features of a pesticide storage facility's interior that, in combination, promote both worker safety and pesticide container security. This document is Fact Sheet PI-31, part of a series from the Pesticide Information Office, Food Science and Human Nutrition Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
    Get full text
    Article