Showing 2,021 - 2,040 results of 5,943 for search '"security"', query time: 0.08s Refine Results
  1. 2021
  2. 2022

    Official Development Assistance in Japan's Strategy in Central Asia by O. A. Dobrinskaya

    Published 2020-07-01
    “…The author comes to the conclusion that realism-based objectives such as getting access to the natural resources of the region, securing its geopolitical stance in the heart of Eurasia and ensuring the support for Japan’s bid to the UN Security Council seat by five Central Asian states dominate Japan’s ODA policy. …”
    Get full text
    Article
  3. 2023

    A Metaheuristic Approach to Detecting and Mitigating DDoS Attacks in Blockchain-Integrated Deep Learning Models for IoT Applications by Manal Alkhammash

    Published 2024-01-01
    “…As a concern of its huge evolution, privacy, and security are vital problems where IoT devices are always susceptible to cyberattacks. …”
    Get full text
    Article
  4. 2024

    Mathematical Modeling of Cyberattack Defense Mechanism Using Hybrid Transfer Learning With Snow Ablation Optimization Algorithm in Critical Infrastructures by Mohamad Khairi Ishak

    Published 2025-01-01
    “…As digitalization upsurges, the requirement for cybersecurity measures becomes even more vital for numerous networks. To certify the security of critical infrastructures, numerous cyber security solutions must be taken together and the essential infrastructure must be developed. …”
    Get full text
    Article
  5. 2025

    System-Level Digital Twin Modeling for Underwater Wireless IoT Networks by Lei Wang, Lei Yan, Xinbin Li, Song Han

    Published 2024-12-01
    “…We introduce a voting-based security prediction model to significantly bolster security in underwater wireless communication. …”
    Get full text
    Article
  6. 2026
  7. 2027
  8. 2028

    Prototype Sistem Keamanan Mobil dengan Menggunakan Quick Response Code Berbasis Android dan Arduino by Kuat Indartono, Abdul Jahir

    Published 2019-05-01
    “…This research succeeded in making prototype car security system based on Android and Arduino. …”
    Get full text
    Article
  9. 2029
  10. 2030
  11. 2031

    Unobtrusive Behavioral and Activity-Related Multimodal Biometrics: The ACTIBIO Authentication Concept by A. Drosou, D. Ioannidis, K. Moustakas, D. Tzovaras

    Published 2011-01-01
    “…Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system, which uses a biodynamic physiological profile, unique for each individual, and advancements of the state of the art in unobtrusive behavioral and other biometrics, such as face, gait recognition, and seat-based anthropometrics. …”
    Get full text
    Article
  12. 2032

    Analysis and Improvement of a Robust User Authentication Framework for Ubiquitous Sensor Networks by Ling Chi, Liang Hu, Hongtu Li, Jianfeng Chu

    Published 2014-03-01
    “…Another is using the Hardware Security Module. After a simple analysis, we have proved that the improved scheme can resist the collusion attack.…”
    Get full text
    Article
  13. 2033

    Discrete event simulation–based energy efficient path determination scheme for probabilistic voting–based filtering scheme in sensor networks by Su Man Nam, Tae Ho Cho

    Published 2020-08-01
    “…Several en-route filtering schemes mainly focus on saving energy through early detection of false data within a short distance against these attacks; however, they cannot immediately block the false data injected by compromised nodes. A security scheme uses context-aware architecture for a probabilistic voting–based filtering scheme to detect the compromised nodes and block the injection of false data, unlike security protocols. …”
    Get full text
    Article
  14. 2034

    Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure by Woong Go, Jin Kawk

    Published 2014-01-01
    “…Thus, in order to establish a secure connection to transmit electricity consumption data, encryption is necessary, for which key distribution is required. …”
    Get full text
    Article
  15. 2035

    Random-Parameters Behavioral Models to Investigate Determinants of Perceived Safety in Railway Stations by Pierluigi Coppola, Luigi dell’Olio, Fulvio Silvestri

    Published 2021-01-01
    “…The estimation results for a medium-sized railway station (Frosinone, Italy) confirmed that safety and security measures are not equally perceived by individuals and the use of random-parameters models leads to more robust estimates. …”
    Get full text
    Article
  16. 2036

    Cryptanalysis of an Image Encryption Algorithm Using DNA Coding and Chaos by Yuzhuo Zhao, Qiqin Shi, Qun Ding

    Published 2025-01-01
    “…Through our comprehensive security analysis, we found a security vulnerability in the mechanism of the association between the key and plaintext and proposed a breaking scheme. …”
    Get full text
    Article
  17. 2037

    APP: An Ultralightweight Scheme to Authenticate ONS and Protect EPC Privacy without Cryptography in EPCglobal Networks by Wei Ren, Liangli Ma, Yi Ren

    Published 2013-06-01
    “…In this paper, we make the first attempt to solve those two security risks together without relying cryptography. …”
    Get full text
    Article
  18. 2038
  19. 2039
  20. 2040

    Trust Management Scheme Based on D-S Evidence Theory for Wireless Sensor Networks by Renjian Feng, Shenyun Che, Xiao Wang, Ning Yu

    Published 2013-06-01
    “…Trust management scheme has been regarded as a powerful tool to defend against the wide set of security attacks and identify malicious nodes. In this paper, we propose a trust management scheme based on revised Dempster-Shafer (D-S) evidence theory. …”
    Get full text
    Article