Showing 2,101 - 2,120 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 2101

    Impacts of Cultivated Land Reclamation on the Climate and Grain Production in Northeast China in the Future 30 Years by Qingling Shi, Yingzhi Lin, Enpei Zhang, Haiming Yan, Jinyan Zhan

    Published 2013-01-01
    “…The result of this study can provide some theoretical support to the agricultural economic development in Northeast China and serve the national macropolicy and food security strategy of the whole China.…”
    Get full text
    Article
  2. 2102
  3. 2103

    Systematic Literature Review of Machine Learning Models for Detecting DDoS Attacks in IoT Networks by Marcos Luengo Viñuela, Jesús-Ángel Román Gallego

    Published 2024-12-01
    “…Recognizing deep learning's effectiveness sets the stage for refining IoT security protocols, and moreover, by identifying challenges, the research informs strategies to enhance IoT security, fostering a resilient framework.…”
    Get full text
    Article
  4. 2104
  5. 2105
  6. 2106

    A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things by Chen Dong, Jinghui Chen, Wenzhong Guo, Jian Zou

    Published 2019-12-01
    “…With the development of the Internet of Things, smart devices are widely used. Hardware security is one key issue in the security of the Internet of Things. …”
    Get full text
    Article
  7. 2107

    Legislation and Policy Capacities in Agricultural Water for Adapting to Climate Change in Iran by N. Heydari, M. Mumtaz, F. Taran

    Published 2025-07-01
    “…Iran has taken various initiatives, enacting related laws and establishing policy measures, to respond to water scarcity and food security in the agricultural sector. This study was conducted to understand and explore Iran’s initiatives, especially through legislation and policy responses, to address water scarcity and food security under CC conditions. …”
    Get full text
    Article
  8. 2108

    Automatic Algorithm for Fractal Plant Art Image Similarity Feature Generation by Zhizhe Liu, Luo Sun

    Published 2021-01-01
    “…The scheme combines SIFT (scale-invariant feature transform) feature secure extraction and locally sensitive hashing algorithm to achieve secure extraction of BOVW features of images. …”
    Get full text
    Article
  9. 2109
  10. 2110

    On Eavesdropping Attacks in Wireless Sensor Networks with Directional Antennas by Hong-Ning Dai, Qiu Wang, Dong Li, Raymond Chi-Wing Wong

    Published 2013-08-01
    “…The eavesdropping attack is a serious security threat to a wireless sensor network (WSN) since the eavesdropping attack is a prerequisite for other attacks. …”
    Get full text
    Article
  11. 2111
  12. 2112

    Masked and Unmasked Face Recognition Model Using Deep Learning Techniques. A case of Black Race. by Mabirizi, Vicent, Ampaire, Ray Brooks, Muhoza, Gloria B.

    Published 2023
    “…Currently, many institutions of higher learning in Uganda are faced with major security threats ranging from burglary to cyber threats. …”
    Get full text
    Article
  13. 2113

    Masked and unmasked Face Recognition Model Using Deep Learning Techniques. A case of Black Race. by Mabiriz,I, Vicent, Ampaire, Ray Brooks, Muhoza, B. Gloria

    Published 2024
    “…Currently, many institutions of higher learning in Uganda are faced with major security threats ranging from burglary to cyber threats. …”
    Get full text
    Article
  14. 2114
  15. 2115

    Devlet-içi Çatışmalarda Üçüncü Taraf Aktörler: Suriye İç Savaşında Türkiye’nin Rolü by Fatma Anıl ÖZTOP

    Published 2019-12-01
    “…The aim of this study is to reveal how decisive the perception of national security is to Turkey's existing or prospective intervention, and to what extent this situation contributes to the behavior and methods of other actors, who are involved in the conflict. …”
    Get full text
    Article
  16. 2116

    Breaking barriers in two-party quantum cryptography via stochastic semidefinite programming by Akshay Bansal, Jamie Sikora

    Published 2025-01-01
    “…In the last two decades, there has been much effort in finding secure protocols for two-party cryptographic tasks. …”
    Get full text
    Article
  17. 2117

    «HYBRID WAR» OF NOTIONS by O. Fridman

    Published 2016-10-01
    “…Ofer Fridman holds the degrees of BA (Military History and Security Studies) from Hebrew University, MA (Counter-Terror and Homeland Security) from Interdisciplinary Center Herzliya and PhD (Political Science, supervised by Prof. …”
    Get full text
    Article
  18. 2118
  19. 2119
  20. 2120