Showing 2,361 - 2,380 results of 5,943 for search '"security"', query time: 0.08s Refine Results
  1. 2361

    Important factors in municipality-based pediatric palliation from healthcare professionals’ perspective: A qualitative study by Kristin Skjærseth, Natalie Preminger, May Aasebø Hauken

    Published 2025-01-01
    “…Conclusion: The importance of establishing security and predictability in municipality-based PPC was emphasized. …”
    Get full text
    Article
  2. 2362

    An Improved Deep Belief Network IDS on IoT-Based Network for Traffic Systems by Rayeesa Malik, Yashwant Singh, Zakir Ahmad Sheikh, Pooja Anand, Pradeep Kumar Singh, Tewabe Chekole Workneh

    Published 2022-01-01
    “…The security challenges such as privacy, scalability, authenticity, trust, and centralization thwart the quick adaptation of the smart services; hence, effective solutions are needed to be in place. …”
    Get full text
    Article
  3. 2363
  4. 2364

    Advancements in training and deployment strategies for AI-based intrusion detection systems in IoT: a systematic literature review by S. Kumar Reddy Mallidi, Rajeswara Rao Ramisetty

    Published 2025-01-01
    “…Abstract As the Internet of Things (IoT) grows, ensuring robust security is crucial. Intrusion Detection Systems (IDS) protect IoT networks from various cyber threats. …”
    Get full text
    Article
  5. 2365

    Emergency Water Supply Dispatching Model for Saving and Storing Fresh Water in River Network Areas Influenced by Saltwater Intrusion by DING Bo, HE Xinchun, WANG Cuiting, WANG Linghe

    Published 2025-01-01
    “…Besides, when the salinity of Modaomen Waterway exceeds the standard level, Tielushan Reservoir is employed to drain the fresh water and regulate the salinity, which can further improve the water supply security and alleviate the influence of saltwater intrusion.…”
    Get full text
    Article
  6. 2366

    Armies of War Without Uniforms: Mercenaries and Private Military Companies in Russia’s Interventions in Syria and Ukraine by Çağla Mavruk, Ali Gök

    Published 2023-04-01
    “…The changing perception of security is the main reason for the resurgence of mercenary activities. …”
    Get full text
    Article
  7. 2367
  8. 2368

    Transformation of the currency regulation regime and foreign economic relations of Russia in the context of expanding anti-Russian sanctions by O. B. Anikin, O. M. Fedin

    Published 2024-11-01
    “…The article discusses the features of currency regulation and foreign economic relations of the Russian Federation (hereinafter referred to as RF, Russia) in the context of the introduction and growth of anti-Russian sanctions by the United States of America, European Union countries and other unfriendly countries, issues related to ensuring the sustainability of the Russian economy and its ability to withstand negative internal and external influences, issues of financial security, which is an important component of the country’s economic security, issues of the current state of the state’s banking system and the Russian economy as a whole. …”
    Get full text
    Article
  9. 2369

    Antecedents of smart tourism destination perceived attractiveness and behavioral intention for digital natives by Andar Danova Lastaripar Goeltom, Ratih Hurriyati, Vanessa Gaffar, Lili Adi Wibowo

    Published 2024-11-01
    “…The study has found that digital natives view of interactivity and digital security can influence their assessment of STD attractiveness. …”
    Get full text
    Article
  10. 2370

    Digital Literacy Education Among Students: Status, Pathways, and Implications in the Current Digital Era by Wang Yi, Wang Siqian

    Published 2025-02-01
    “…However, students from urban areas demonstrate significantly higher digital literacy levels compared to those from rural areas, particularly in security and privacy domains. The findings underscore the need for targeted interventions to enhance digital literacy in areas such as digital content creation and problem-solving. …”
    Get full text
    Article
  11. 2371

    A lightweight privacy preservation authentication protocol for IoMT using ECC based blind signature by Kalpana Samal, Shanta Kumari Sunanda, Debasish Jena, Srikanta Patnaik

    Published 2025-01-01
    “…This research proposes a protocol for secure authentication of IoMT devices while protecting user privacy. …”
    Get full text
    Article
  12. 2372

    Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review by Shubhkirti Sharma, Vijay Kumar, Kamlesh Dutta

    Published 2024-01-01
    “…The paper presents a systematic review of intrusion detection in Internet of Things (IoT) networks using multi-objective optimization algorithms (MOA), to identify attempts at exploiting security vulnerabilities and reducing the chances of security attacks. …”
    Get full text
    Article
  13. 2373

    Detecting Cross-Site Scripting in Web Applications Using Fuzzy Inference System by Bakare K. Ayeni, Junaidu B. Sahalu, Kolawole R. Adeyanju

    Published 2018-01-01
    “…Cross-site scripting (XSS) is a form of web security attack which involves the injection of malicious codes into web applications from untrusted sources. …”
    Get full text
    Article
  14. 2374

    A User Authentication Scheme Using Physiological and Behavioral Biometrics for Multitouch Devices by Chorng-Shiuh Koong, Tzu-I Yang, Chien-Chao Tseng

    Published 2014-01-01
    “…Although forcing users to change password periodically can enhance the security level, it may also be considered annoyances for users. …”
    Get full text
    Article
  15. 2375

    Protecting Compressive Ghost Imaging with Hyperchaotic System and DNA Encoding by Jingru Sun, Mu Peng, Fang Liu, Cong Tang

    Published 2020-01-01
    “…As computational ghost imaging is widely used in the military, radar, and other fields, its security and efficiency became more and more important. …”
    Get full text
    Article
  16. 2376

    Ungoverned Spaces and Menace of Herder-Farmer Conflictin Ondo State, South West Nigeria by Adebajo Adeola Aderayo, Orebanjo Abiodun Olusola

    Published 2023-03-01
    “…Drones can be deployed to monitor the operation of herders in the forests. Amotekun security outfit should be trained and adequately equipped with weapons for maximum delivery.…”
    Get full text
    Article
  17. 2377
  18. 2378

    Multiobjectives for Optimal Geographic Routing in IoT Health Care System by K. Aravind, Praveen Kumar Reddy Maddikunta

    Published 2022-01-01
    “…The IoT network is wireless, which leads to security breaches. Therefore, there is a necessity to have a secured data transmission in the context of healthcare. …”
    Get full text
    Article
  19. 2379
  20. 2380

    Medical Image Encryption and Decryption Based on DNA: A Survey by Saja Theab Ahmed, Dalal Abdulmohsin Hammood, Raad Farhood Chisab, Nurulisma Binti Hj. Ismail

    Published 2023-09-01
    “…If DNA is employed appropriately, it can be used to achieve a number of security technologies, including encryption, steganography, signature, and authentication through the use of DNA molecules as information carriers. …”
    Get full text
    Article