Showing 2,301 - 2,320 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 2301

    Analisis Kualitas Performa Aplikasi Digital Banking X Menggunakan Framework ISO 25010 by Medina Nurul Zahra, Kraugusteeliana Kraugusteeliana

    Published 2023-07-01
    “…The conclusion is that the critical characteristic is security, which can refer to the evaluation quality of performance X application. …”
    Get full text
    Article
  2. 2302
  3. 2303

    Analisis Komparatif Keamanan Aplikasi Pengelola Kata Sandi Berbayar Lastpass, 1Password, dan Keeper Berdasarkan ISO/IEC 25010 by Whisnu Yudha Aditama, Ira Rosianal Hikmah, Dimas Febriyan Priambodo

    Published 2023-08-01
    “…In addition, three applications have the same level of security in securing user data from unauthorized parties, and implement the use of digital signatures or certificates to prevent denial. …”
    Get full text
    Article
  4. 2304
  5. 2305

    Exploring real estate blockchain adoption: An empirical study based on an integrated task-technology fit and technology acceptance model. by Hailan Yang, Zixian Zhang, Chen Jian, Nisar Ahmad

    Published 2025-01-01
    “…The study's findings indicate that attitude, perceived usefulness (PU) and data privacy and security (DPS) exerts highest influence in the proposed theoretical model. …”
    Get full text
    Article
  6. 2306

    A hybrid model of extended FMEA model based on F-PIPRECIA and Z-EDAS methods with Bow Tie to evaluate cybersecurity risks in Industry 4.0 by Ali Memarpour Ghiaci, Jafar Gheidar-Kheljani

    Published 2024-03-01
    “…Cyber security issues have become a complex challenge for companies that obligating to Industry 4.0 paradigm. …”
    Get full text
    Article
  7. 2307

    Personal OAuth authorization server and push OAuth for Internet of Things by Seung Wook Jung, Souhwan Jung

    Published 2017-06-01
    “…However, Internet of Things security is an essential factor. OAuth is one of the most successful authentication and authorization protocols on the Internet. …”
    Get full text
    Article
  8. 2308

    NIGERIAN AIRFORCE STRATEGIC DEVELOPMENT AND CAPACITY IN THE FOURTH REPUBLIC, 2019-2023 by EFEFIONG ASUQUO EDET, INAH EMMANUEL MKPE, AKPANKE BETIANG JOSEPH

    Published 2024-09-01
    “…This situation has preoccupied the national security forces, including the Airforce which has carried out several operations to address these threats. …”
    Get full text
    Article
  9. 2309

    A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks by Yasmin M. Amin, Amr T. Abdel-Hamid

    Published 2016-01-01
    “…With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. …”
    Get full text
    Article
  10. 2310

    Two-Party Quantum Private Comparison Protocol for Direct Secret Comparison by Min Hou, Yue Wu

    Published 2025-01-01
    “…A simulation on the IBM Quantum Platform demonstrates the protocol’s feasibility, and a security analysis confirms its robustness against potential eavesdropping and participant attacks. …”
    Get full text
    Article
  11. 2311

    THE UTILITY OF EARLY WARNING SYSTEM AND CRIME PREVENTION: A STUDY OF THE ABDUCTION OF SCHOOL CHILDREN IN NIGERIA by OCHOGA EDWIN OCHOGA, AKHANOLU LILIAN NNENNE

    Published 2022-05-01
    “…This is essential for interrogation, as the abduction of school children has become a threat to national security. The paper used qualitative data from secondary literature and conceptualized theories of early warning signs to provide a theoretical base for its argument. …”
    Get full text
    Article
  12. 2312

    Motorcycle Engine Start System Using Fingerprint and Voice Command by Wabdillah, Akbar Iskandar, Syahriandi

    Published 2023-06-01
    “…Making the starter engine system on this motorbike is to make it easier for users to turn on the motorbike without using a key so that they only use voice commands through an application found on an Android smartphone. In the security section, fingerprints are used as a substitute for manual ignition on motorbikes. …”
    Get full text
    Article
  13. 2313

    Cyberterrorism: content, forms and promising countermeasures by D. S. Melnyk

    Published 2023-10-01
    “…The counteraction system may be based on the following: proper regulation of the concept of cyber terrorism in national legislation, criminalisation of acts of cyber terrorism and its components; enhancing the security and protection of critical information infrastructure; improving existing and applying new counteraction methods; improving cooperation in the field of combating cyber terrorism.…”
    Get full text
    Article
  14. 2314

    YOUTHS PROTEST IN NIGERIA: THE ENDSARS IN PERSPECTIVE by Felix Ikalewumi

    Published 2022-05-01
    “…However, where neglected, unskilled and lacked the requisite social security in the event of poor governance, low education, poor investment environment and other essential qualities of lives, youths becomeliability, threat and object of national instability to their country. …”
    Get full text
    Article
  15. 2315
  16. 2316

    Application Research of Intelligent Classification Technology in Enterprise Data Classification and Gradation System by Lina Yu, Chunwei Wang, Huixian Chang, Sheng Shen, Fang Hou, Yingwei Li

    Published 2020-01-01
    “…Classification and gradation system adopts different security protection schemes for different types of data by implementing classification and gradation management of data, which is an important pretechnical means for data security protection and prevention of data leakage. …”
    Get full text
    Article
  17. 2317

    The use of technological innovations in military armaments -contemporary trends and future prospects by Zbigniew Małodobry, Karolina Nastaj-Sałek, Katarzyna Cyrkun, Mariusz Kuliński

    Published 2024-12-01
    “…The conclusions suggest that the development of new technologies will require appropriate international regulations, as well as new challenges related to ethics and security. Understanding these processes is crucial to ensuring global security. …”
    Get full text
    Article
  18. 2318

    Global agricultural trade architecture: contemporary triggers by E. N. Smirnov, E. A. Karelina, M. G. Pletnev

    Published 2024-12-01
    “…It has also been found that world agricultural commodity prices will stabilize in the medium term, which is an important factor in the food security of developing countries.…”
    Get full text
    Article
  19. 2319

    Authenticity at Risk: Key Factors in the Generation and Detection of Audio Deepfakes by Alba Martínez-Serrano, Claudia Montero-Ramírez, Carmen Peláez-Moreno

    Published 2025-01-01
    “…Detecting audio deepfakes is crucial to ensure authenticity and security, especially in contexts where audio veracity can have critical implications, such as in the legal, security or human rights domains. …”
    Get full text
    Article
  20. 2320

    Toward sustainable desalination: a patent analysis of technology-development trajectories by Kyungsun Lee, Wendy Jepson

    Published 2025-01-01
    “…Research and development (R&D) in desalination has enabled innovations and expanded global water-supply capacity to enhance water security. Despite increased desalination capacity, significant sustainability concerns persist. …”
    Get full text
    Article