Showing 2,261 - 2,280 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 2261

    Le paysage à l’épreuve des « nouveaux » défis de l’aménagement du territoire au Maroc : contraintes et perspectives by Mustapha El Hannani, Aude Nuscia Taïbi, Yahia El Khalki, Abdelhalim Benyoucef

    Published 2009-06-01
    “…The Moroccan regional planning was often marked by security concerns, based on historic inheritances of conflicting relations between central authority and tribes. …”
    Get full text
    Article
  2. 2262
  3. 2263

    Dynamics and Control of Worm Epidemic Based on Mobile Networks by SEIQR-Type Model with Saturated Incidence Rate by Rui Hu, Qingwu Gao, Bairong Wang

    Published 2021-01-01
    “…The mobile networks have increasingly facilitated our daily life but are also breeding grounds for malicious worms, which are considered as the main threat to cyber security. The purpose of this paper is to analyze the dynamics of worm propagation and to control the worm epidemic based on mobile-phone networks. …”
    Get full text
    Article
  4. 2264

    A Novel Algorithm for Defending Path-Based Denial of Service Attacks in Sensor Networks by Ramzi Saifan, Omar Al-Jarrah

    Published 2010-12-01
    “…Existing end-to-end security mechanisms are vulnerable to path-based denial of service attacks (PDoS). …”
    Get full text
    Article
  5. 2265

    On the Implementation of a Dynamic Direction Modulation System with Vector Modulators by Edith Annette Cabrera-Hernández, Josep Parron, Alan Tennant

    Published 2019-01-01
    “…Dynamic directional modulation (DDM) has already proven to be an efficient technique to achieve physical layer security in wireless communications. System architectures based on vector modulators provide a flexible framework to implement synthesis methods that allow us to obtain increased security and/or independent multichannel transmissions. …”
    Get full text
    Article
  6. 2266

    Evolutionary Game and Numerical Simulation of Cultivated Land Protection Policies Implementation in China by Xinhai Lu, Yanwei Zhang, Yucheng Zou

    Published 2021-01-01
    “…The effective implementation of cultivated land protection policies (CLPP) has important practical significance for improving China’s food security and ecological security. The central government, local governments, and farmers have mutually restricted and influencing interest relations. …”
    Get full text
    Article
  7. 2267

    Access Control Points: Reducing a Possible Blast Impact by Meandering by Martin Larcher, Georgios Valsamos, Vasilis Karlos

    Published 2018-01-01
    “…Such control zones could be located within the building that has to be protected or attached to it. The elevated security needs for these areas call for a design that will consider the risk of internal explosive events. …”
    Get full text
    Article
  8. 2268

    A Dynamically Reconfigured Multi-FPGA Network Platform for High-Speed Malware Collection by Sascha Mühlbach, Andreas Koch

    Published 2012-01-01
    “…Malicious software has become a major threat to computer users on the Internet today. Security researchers need to gather and analyze large sample sets to develop effective countermeasures. …”
    Get full text
    Article
  9. 2269

    Elliptic-Curve Cryptography Implementation on RISC-V Processors for Internet of Things Applications by Preethi Preethi, Mohammed Mujeer Ulla, G. Praveen Kumar Yadav, Kumar Sekhar Roy, Ruhul Amin Hazarika, Kuldeep Saxena K.

    Published 2024-01-01
    “…Elliptic-curve cryptography (ECC) is a popular technique of public-key cryptography used for secure communications in Internet of Things (IoT) applications. …”
    Get full text
    Article
  10. 2270
  11. 2271
  12. 2272

    Innovative Technologies for Improved Water Productivity and Climate Change Mitigation, Adaptation, and Resilience: A Review by E. Oiganji, H. Igbadun, P. S. Amaza, R. Z. Lenka

    Published 2025-02-01
    “… Water scarcity, exacerbated by climate change, poses severe challenges to agriculture, food security, and sustainable development, particularly in vulnerable regions. …”
    Get full text
    Article
  13. 2273

    DIAGNOSTIC EVALUATION OF URBAN METRO TRANSIT SYSTEM POST-COVID-19 by Salman KHURSHEED, Shagufta YASMIN

    Published 2024-09-01
    “…The survey covers commuter perceptions of safety & security, financial & economic factors, infrastructure & comfort and functional & operational features. …”
    Get full text
    Article
  14. 2274

    Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks by Hae Young Lee

    Published 2015-01-01
    “…The existing solutions are vulnerable to such a type of security attacks, called manipulated compilation attacks (MCAs), since they assume that CHs are uncompromised. …”
    Get full text
    Article
  15. 2275

    Second-degree branch structure blockchain expansion model by Qiang Liu, Baoyan Song, Junlu Wang

    Published 2022-03-01
    “…Finally, a set of malicious attacks is simulated to realize the security constraints of the blockchain, to verify the security of the second-degree branch chain model. …”
    Get full text
    Article
  16. 2276

    Ranking the Return on Assets of Tehran Stock Exchange by a New Method Based on Z-Numbers Data by Maryam Farzam, Mozhdeh Afshar Kermani, Tofigh Allahviranloo, Azim Aminataei

    Published 2023-01-01
    “…The advantage of this method over conventional fuzzy methods is considering uncertainty and allocating credit in the opinion of experts to estimate fuzzy parameters, and in the second example, we ranked the factors which affect the productivity of tourism security. Then, by using the proposed algorithm, we introduce the most important and the least important factors for tourist security budgeting.…”
    Get full text
    Article
  17. 2277

    DEMOCRACY AND THE FIGHT AGAINST LEADERSHIP CORRUPTION IN SUB-SAHARAN AFRICA: IMPLICATION FOR CONTINENTAL DEVELOPMENT by TAIWO FRANCIS AYOMOBA

    Published 2024-08-01
    “… This paper examines democracy and the fight against leadership corruption in relation to Africa and its implication on development and security issues using a qualitative data gathering and analysis method. …”
    Get full text
    Article
  18. 2278

    Challenges in providing correctional service education: A case study in a correctional institution in Amhara regional state, Ethiopia by Genet Gelana Kabeta, S G Pretorius

    Published 2023-06-01
    “…It was concluded that the majority of challenges faced in the case correctional institution occurred as a result of inadequate attention and conflicting missions of the correctional institution (security and rehabilitation) and the tendency of prioritizing security over rehabilitation. …”
    Get full text
    Article
  19. 2279

    Comparison of Military Potentials of USA, PRC, and Some Countries in APR from the Standpoint of Western Analysts by M. Tchaikovsky, A. Kazantsev

    Published 2012-08-01
    “…In connection with the rising significance of the APR in the global economy, Western military and political analysts consider the PRC power strengthening as a challenge to the security and impact of the USA not only in this region, but also globally. …”
    Get full text
    Article
  20. 2280

    eDAAAS: Efficient distributed anonymous authentication and access in smart homes by An Braeken, Pawani Porambage, Milos Stojmenovic, Lambros Lambrinos

    Published 2016-12-01
    “…Internet of Things applications for the smart home are very heterogeneous and continuously increasing in number, making user management from a security perspective very challenging. Moreover, the resource-constrained nature of most of the devices implies that any security mechanisms deployed should be lightweight and highly efficient. …”
    Get full text
    Article