Showing 2,201 - 2,220 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 2201

    Vegetation growth improvement Inadequately represents the ecological restoration of the Populus euphratica forests in Xinjiang, China by Xuefei Guo, Junli Li, Jiudan Zhang, Chunxia Wei, Zhijun Li

    Published 2025-01-01
    “…The Populus euphratica Oliv (P. euphratica) is a representative tree species in the riparian forests of arid regions, which acts as a barrier to prevent desert invasion and provides various ecosystem services for biodiversity conservation and ecological security. However, the community of P. euphratica has experienced significant shrinkage and ecological degradation over the past centuries due to natural and anthropogenic factors, particularly in the arid regions of Xinjiang, China. …”
    Get full text
    Article
  2. 2202

    Learning deep forest for face anti-spoofing: An alternative to the neural network against adversarial attacks by Rizhao Cai, Liepiao Zhang, Changsheng Chen, Yongjian Hu, Alex Kot

    Published 2024-10-01
    “…Face anti-spoofing (FAS) is significant for the security of face recognition systems. neural networks (NNs), including convolutional neural network (CNN) and vision transformer (ViT), have been dominating the field of the FAS. …”
    Get full text
    Article
  3. 2203
  4. 2204
  5. 2205

    Fortifying IoT Infrastructure Using Machine Learning for DDoS Attack within Distributed Computing-based Routing in Networks by Sharaf Aldeen Abdulkadhum Abbas, Abdullahi Abdu Ibrahim

    Published 2024-06-01
    “…On the other hand, if we consider the conventional security approaches, these security devices mostly use traditional security protocols such as password encryption and user authentication respectively. …”
    Get full text
    Article
  6. 2206

    Complementary Feeding Practices and Household Food Insecurity Status of Children Aged 6–23 Months in Shashemene City West Arsi Zone, Oromia, Ethiopia by Junayde Abdurahmen Ahmed, Kebede Kumsa Sadeta, Kelil Hussen Lembo

    Published 2022-01-01
    “…Household socioeconomic status (wealth index, food security status, household income) and child age were found to be among the factors statistically significantly associated with complementary feeding practices indicators.…”
    Get full text
    Article
  7. 2207

    A Framework for Fourth Industrial Revolution Adoption by Small-Scale Rural Farmers in Sub-Saharan Africa: A Systematic Literature Review by Willard Munyoka, Nkhangweni Lawrence Mashau, Modimowabarwa Kanyane

    Published 2025-01-01
    “…This is a major global threat to agriculture and food security, especially for rural farmers. Small-scale rural-based farmers contribute immensely to local communities’ socio-economic well-being and food security. …”
    Get full text
    Article
  8. 2208

    Special Features of the Crime’s Subject Under the Article 330 of the Criminal Code of Ukraine by V. Yu. Boichuk

    Published 2019-03-01
    “…As a result, the author has come to the conclusion that a special subject of the crime under the Art. 330 of the Criminal Code of Ukraine may be officers of the departments of the National Police of Ukraine, the State Investigation Bureau, the Security Service of Ukraine, the Foreign Intelligence Service of Ukraine, the State Border Guard Service of Ukraine, the Office of State Security, the State Fiscal Service of Ukraine, the State Penal Service of Ukraine, the Ministry of Defense of Ukraine, the President of Ukraine, officials of the President’s Administration of Ukraine, Verkhovna Rada of Ukraine, Cabinet of Ministers of Ukraine, National Security and Defense Council of Ukraine, Supreme High Command General Headquarters of Ukraine, the Ministry of Defense of Ukraine, the General Staff of Armed Forces of Ukraine, the unions, military units and units of the Armed Forces of Ukraine, the State Special Transport Service, the State Service for Special Communications and Information Protection of Ukraine, the National Guard of Ukraine, the Council of Ministers of the Autonomous Republic of Crimea, regional, district, city and district in the cities, state administrations and local self-government agencies, as well as officials of enterprises, institutions and organizations that carry out state defense orders, conduct research and perform development in the defense area, etc.…”
    Get full text
    Article
  9. 2209

    Interaction of the National Police of Ukraine and civil society institutions: concept and legal framework by V. V. Pylyp

    Published 2023-09-01
    “…The introduction of martial law on the territory of Ukraine and the existence of real threats to national security have led to dramatic changes in the usual order of public administration, in particular in the activities of the security and defence sector, law enforcement agencies, local self-government, etc. …”
    Get full text
    Article
  10. 2210

    Activities of the Minister of Internal Affairs of the Ukrainian SSR Pavlo Yakovlevych Meshyk (1953) by V. A. Grechenko

    Published 2024-03-01
    “…At the same time, a policy was implemented to rid the state security agencies of their dependence on the influence of the Communist Party. …”
    Get full text
    Article
  11. 2211

    The formula for Peace as a result of a future without war in Ukraine by M. Pyvovar

    Published 2025-01-01
    “…Since 2014, attempts at peaceful resolution, including the Minsk Contact Group and the Normandy Format, failed to secure a ceasefire or reintegration of Donbas, nor did they avert russia’s full-scale invasion in February 2022. …”
    Get full text
    Article
  12. 2212

    Physical One‐Way Functions for Decentralized Consensus Via Proof of Physical Work by Marvin Winkler, Catharina Peither, Simon Petrick, Lothar Seidemann, Holger Jelich, Frank Kleine Jäger, Jörn Müller‐Quade, Alexander Colsmann, Hermann Nirschl, Frank Rhein

    Published 2025-02-01
    “…Boundary conditions for the security requirements are established and discussed as well as experimentally investigated for a specific setup based on printing and optical analysis of pigment‐carrier composites. …”
    Get full text
    Article
  13. 2213

    Cross-Chain Identity Authentication Method Based on Relay Chain by Qipeng Huang, Minsheng Tan, Wenlong Tian

    Published 2025-01-01
    “…Therefore, our method demonstrates superior security and performance in cross-chain privacy protection.…”
    Get full text
    Article
  14. 2214

    Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection by Rafał Kozik, Marek Pawlicki, Michał Choraś, Witold Pedrycz

    Published 2019-01-01
    “…Network and information security are regarded as some of the most pressing problems of contemporary economy, affecting both individual citizens and entire societies, making them a highlight for homeland security. …”
    Get full text
    Article
  15. 2215

    The influence of service quality on the Aceh government SIGAP website by Irham Maulida, Ulung Pribadi

    Published 2023-12-01
    “…The influence of Responsiveness, Reliability, and Security on service quality has a positive but not significant effect. …”
    Get full text
    Article
  16. 2216

    A Two-Layer Architecture for Failure Prediction Based on High-Dimension Monitoring Sequences by Xue Wang, Fan Liu, Yixin Feng, Jiabao Zhao

    Published 2021-01-01
    “…In recent years, the distributed architecture has been widely adopted by security companies with the rapid expansion of their business. …”
    Get full text
    Article
  17. 2217

    Explaining the Role of Geopolitical Components Affecting spatial planning of border regions (Case Study: West Azarbaijan Province) by Ahmad Aftab, Ali Majnoony, Akbar Houshmand

    Published 2022-06-01
    “…Therefore, according to the findings of the research, it is suggested that security and security measures are implemented with economic, political, and socio-cultural approaches.…”
    Get full text
    Article
  18. 2218

    An authentication and key agreement mechanism for OPC Unified Architecture in industrial Internet of Things by Min Wei, Shuaidong Zhang, Ping Wang, Keecheon Kim

    Published 2018-01-01
    “…It establishes the secure channel and provides a guarantee for secure session for the OPC Unified Architecture server and client. …”
    Get full text
    Article
  19. 2219

    Adversarial Attack Detection in Smart Grids Using Deep Learning Architectures by Stephanie Ness

    Published 2025-01-01
    “…The suggested framework strengthens smart grid immunity to cyber threats such as DoS attacks, back door injections, and adversarial perturbations while increasing energy distribution stability and security. For enhancing smart grid security, our results emphasize the importance of integration of ML and DL techniques and provide such an understanding of threat environment for future research and development on threat identification.…”
    Get full text
    Article
  20. 2220

    Militarised Safety: Politics of Exclusion by Ayesha Sarfraz, Arsalan Rafique

    Published 2017-02-01
    “…This paper looks at urban space in the developing world as a dual site of the threat and the threatened while questioning the effectivity of security apparatus that have become the foundations for design of the contemporary city.…”
    Get full text
    Article