Showing 2,061 - 2,080 results of 5,943 for search '"security"', query time: 0.06s Refine Results
  1. 2061

    Encrypted Search Method for Cloud Computing Data Under Attack Based on TF-IDF and Apriori Algorithm by Demei Mao, Mingzhu Wang

    Published 2025-12-01
    “…SEMSS uses the Apriori algorithm to mine the co-occurrence relationship between words and find the keyword set that meets the minimum support threshold to improve the recall rate of search results. Finally, the security of the scheme is verified from the aspects of semantic security, effici this paper designsency, data integrity, etc. …”
    Get full text
    Article
  2. 2062
  3. 2063

    Machine Learning-Based Network Detection Research for SDNs by Lai Jiayue

    Published 2025-01-01
    “…This research endeavors to fortify the security posture of Software-Defined Networks (SDN) through the strategic utilization of intelligent machine learning techniques, with a primary focus on mitigating detrimental Denial of Service (DoS) attacks. …”
    Get full text
    Article
  4. 2064

    A Trusted Federated Learning Method Based on Consortium Blockchain by Xiaojun Yin, Xijun Wu, Xinming Zhang

    Published 2024-12-01
    “…However, traditional FL methods face challenges in ensuring trust, security, and efficiency, particularly in heterogeneous environments with varying computational capacities. …”
    Get full text
    Article
  5. 2065
  6. 2066
  7. 2067

    Enhancing network lifetime in WSNs through coot algorithm-based energy management model by Namita Shinde, Dr. Vinod H․ Patil

    Published 2025-06-01
    “…This addresses issues such as high energy consumption, communication delays, and security.To ensure energy savings and network reliability, the fitness function evaluates cluster heads and best routes based on constraints.COOT outperforms other Metaheuristics Algorithms like Butterfly Optimization Algorithm, Genetic Algorithm, Tunicate Swarm Gray Wolf Optimization Algorithm, and Bird Swarm Algorithm in simulation with performance measurements and enhancing network functionality and protection.Key methodology points include: • Proposed a multiple constraints clustering and routing technique using COAto solve the most crucial issues that arise in WSNs. • Integrated an advanced fitness function that determines cluster head selection, and the routing path based on residual energy, delay, security, trust, distance, and link quality so that energy load is evenly distributed and credible data flow is maintained across the network and made Innovative and Effective Solution. • Proven Results Demonstrated superior network performance, achieving the lowest delay, highest network lifetime (3571 rounds) and enhanced security (0.8) and trust (0.6) compared to existing algorithms with less energy consumption, making it the most suitable solution for WSN performance improvement.…”
    Get full text
    Article
  8. 2068

    The Role of Cognitive Science and Big Data Technology in the Design of Business Information Management Systems by Yangfan Li

    Published 2022-01-01
    “…For the application scenario of multitenant distributed data access, a data transparent security management model is proposed. Simulation experiments show that this method can realize data security management when the performance loss is controlled within an acceptable range. …”
    Get full text
    Article
  9. 2069

    Secret sharing-based authentication and key agreement protocol for machine-type communications by Ana Paula G Lopes, Lucas O Hilgert, Paulo RL Gondim, Jaime Lloret

    Published 2019-04-01
    “…The comparisons regard security properties and computational and communication costs. …”
    Get full text
    Article
  10. 2070

    DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments by Min Su Song, Jae Dong Lee, Young-Sik Jeong, Hwa-Young Jeong, Jong Hyuk Park

    Published 2014-01-01
    “…Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. …”
    Get full text
    Article
  11. 2071

    AN EXAMINATION OF THE IMPACT OF NATIONAL DEFENCE STRATEGY ON THE WAR AGAINST INSURGENCY IN NIGERIA. A STUDY OF IGABI LOCAL GOVERNMENT AREA IN KADUNA STATE. 2016– 2023 by MOHAMMED KABEER GARBA, PROFESSOR USMAN Muhammed

    Published 2024-06-01
    “… The growing challenges in Nigeria’s National Security hasbecome a major threat to the overall well-being of everyone living in Nigeria, neighbouring countries and her sovereignty in general. …”
    Get full text
    Article
  12. 2072

    DEFENSE COOPERATION IN EUROPE: SUBREGIONAL LEVEL by Y. I. Nadtochey

    Published 2016-06-01
    “…The evolution of subregional cooperation among European nations in security and defense area is the topic of the article. …”
    Get full text
    Article
  13. 2073

    Growing together: unveiling the potential of school-based community gardens to foster well-being, empowerment, and sustainability by Tinashe Paul Kanosvamhira

    Published 2025-01-01
    “…The research contends that school-based community gardens can wield significant influence in enhancing food security and nutrition, catalyzing community development, and nurturing environmental sustainability. …”
    Get full text
    Article
  14. 2074

    Enhancing Amarath Growth and Yield in Kabale District. by Tumwine, David

    Published 2024
    “…Amaranth, a highly nutritious and versatile crop, has emerged as a promising solution to food security and malnutrition challenges, particularly in regions like Kabale District in Uganda. …”
    Get full text
    Thesis
  15. 2075

    Spousal Individual Retirement Accounts by Lisa Leslie

    Published 2014-11-01
    “… A spouse who stays at home to take care of children or other dependents is likely to have reduced Social Security benefits and will not have access to a workplace retirement plan. …”
    Get full text
    Article
  16. 2076
  17. 2077
  18. 2078
  19. 2079

    SUSTAINABLE GROUNDWATER MANAGEMENT THROUGH GROUNDWATER IRRIGATION ADVISORY APPLICATION (GIAA) by Muhammad Mohsin Waqas

    Published 2024-06-01
    “…Despite these challenges, groundwater remains indispensable for global food security, supporting approximately 60% of irrigated agriculture worldwide. …”
    Get full text
    Article
  20. 2080

    Research on new energy power plant network traffic anomaly detection method based on EMD by Danni Liu, Shengda Wang, YutongLi, Ji Du, Jia Li

    Published 2025-01-01
    “…Abstract Overview As Photovoltaic (PV) systems connect into the grid and depend on digital technology, risks develop from obsolete components, insufficient security measures, and insecure access points. Objectives Improve the safety and dependability of the main data communication network by conducting research on Proactive Coordinated Fault-Tolerant Federation (PCFT) security structure, building an early warning simulation to handle power data interactions network abnormalities, studying algorithms and technologies for abnormal traffic control, and effectively managing abnormal network traffic like DDoS, network scanning, along with surge traffic; Improve the capability of the SLA hierarchical service, enhance the service quality of the core services executed through the backbone network, as well as strengthen the security capability of the access system for the new energy power plant’s communication network by combing and analyzing the traffic of the main network of the current information communication network. …”
    Get full text
    Article