Showing 501 - 520 results of 5,943 for search '"securities"', query time: 0.05s Refine Results
  1. 501

    Secure Pesticide Storage: Using and Managing a Pesticide Storage Facility by Thomas W. Dean

    Published 2004-10-01
    “…Revised: November 2004.  PI33/PI068: Secure Pesticide Storage: General Features (ufl.edu) …”
    Get full text
    Article
  2. 502

    Synchronization of chaotic optomechanical system with plasmonic cavity for secured quantum communication by Mulubirhan Dangish, Abebe Belay Gemta, Alemayehu Getahun Kumela, Umer Sherefedin, Ruth Birhanu

    Published 2025-01-01
    “…Our findings pave the way for enhanced coherence and reliability in secure quantum communication systems, thus contributing to the advancement of this rapidly evolving field.…”
    Get full text
    Article
  3. 503
  4. 504
  5. 505
  6. 506
  7. 507

    A distributed data secure transmission scheme in wireless sensor network by Wei Liang, Yin Huang, Jianbo Xu, Songyou Xie

    Published 2017-04-01
    “…Therefore, it is difficult to ensure security of broadcasting data transferred from a single wireless sensor node to base station. …”
    Get full text
    Article
  8. 508

    An Investigation into Information Security Managerial Practices in Selected Public Sector Organizations. by Ahimbisibwe, Benjamin K., Nabende, Peter, Musiimenta, Florence

    Published 2023
    “…The study aims to examine information security managerial practices in organisations. It was guided by three specific objectives: identification of information security practices critical to information assets management; establishment of implementation processes involved in the execution of structured information security governance; and evaluation of policies that influence information security best practices. …”
    Get full text
    Article
  9. 509
  10. 510
  11. 511
  12. 512

    Adaptive Security Solutions for NOMA Networks: The Role of DDPG and RIS-Equipped UAVs by Syed Zain Ul Abideen, Abdul Wahid, Mian Muhammad Kamal

    Published 2024-11-01
    Subjects: “…non-orthogonal multiple access, reconfigurable intelligent surface, unmanned aerial vehicles, deep reinforcement learning, deep deterministic policy gradient, physical layer security.…”
    Get full text
    Article
  13. 513

    Improving Network Security: An Intelligent IDS with RNN-LSTM and Grey Wolf Optimization by murtadha ali

    Published 2024-12-01
    “…The architecture of this RNN-LSTM with GWO IDS provides capable and responsive intrusion detection, training on previous data to be able to detect new threats. Made for network security by combining deep learning and optimization, tests reached 99.5% accurate. …”
    Get full text
    Article
  14. 514

    Secure UAV-Based System to Detect Small Boats Using Neural Networks by Moisés Lodeiro-Santiago, Pino Caballero-Gil, Ricardo Aguasca-Colomo, Cándido Caballero-Gil

    Published 2019-01-01
    “…Given the high sensitivity of the managed information, the proposed system includes cryptographic protocols to protect the security of communications.…”
    Get full text
    Article
  15. 515
  16. 516

    Advanced Approach to Information Security Management System Model for Industrial Control System by Sanghyun Park, Kyungho Lee

    Published 2014-01-01
    “…Therefore, a new information security management system based on confidentiality, integrity, and availability as well as safety is required for ICSs. …”
    Get full text
    Article
  17. 517

    Legal Regulation of Interaction of Security Service of Ukraine with Civil Society in Counteracting Terrorism by A. Yu. Helzhynskyi

    Published 2019-09-01
    “…The comparative legal method of the study analyzes the source base of national law concerning the interaction of the Security Service of Ukraine with civil society in fighting against terrorism. …”
    Get full text
    Article
  18. 518

    THE SECURITY ASPECT OF TURKEY-UNITED STATES RELATIONS: IN SEARCH FOR A NEW MODEL by I. A. Svistunova

    Published 2016-04-01
    “…Security cooperation has always been an important aspect of the relations between Turkey and the USA. …”
    Get full text
    Article
  19. 519
  20. 520

    Aukus (Australia-united kingdom-united states) threat to Indo-pacific security by Ismiyatun Ismiyatun, Ita Puji Lestari

    Published 2024-11-01
    “…Countries can change their defense budgets based on their assessment of security threats in the region and changes in the balance of power. …”
    Get full text
    Article