Showing 2,461 - 2,480 results of 5,943 for search '"security"', query time: 0.08s Refine Results
  1. 2461
  2. 2462

    A Novel Scheme for Construction of S-Box Using Action of Power Associative Loop and Its Applications in Text Encryption by Muhammad Asif, Sayeda Wajiha, Sameh Askar, Hijaz Ahmad

    Published 2024-01-01
    “…The Avalanche Effect test is used to examine the effectiveness of our technique, and it confirmed the robustness and security of our encryption scheme.…”
    Get full text
    Article
  3. 2463

    EPPTA: Efficient partially observable reinforcement learning agent for penetration testing applications by Zegang Li, Qian Zhang, Guangwen Yang

    Published 2025-01-01
    “…Abstract In recent years, penetration testing (pen‐testing) has emerged as a crucial process for evaluating the security level of network infrastructures by simulating real‐world cyber‐attacks. …”
    Get full text
    Article
  4. 2464
  5. 2465

    A Multi-Signature Scheme for Defending Malleability Attack on DeFi by Chen Zhang, Wenyu Liao, Xiaobin Liu, Huanrong Wu, Mohammed J. F. Alenazi

    Published 2025-01-01
    “…Signatures are crucial in blockchain-based Decentralised Finance (DeFi) protocols because they ensure the security and integrity of transactions and smart contracts. …”
    Get full text
    Article
  6. 2466

    Levels Politechnic Community Satisfaction to The Use of Lebuhraya Pantai Timur 2 by Rosmida binti Ab Ghani, Najah binti Mohd Nawi, Norhafiza binti Idris

    Published 2018-11-01
    “…Results of this analysis showed a mean value for items 'security level' in LPT2 is 2.29, i.e. at low mean score. …”
    Get full text
    Article
  7. 2467

    Trust-Centric and Economically Optimized Resource Management for 6G-Enabled Internet of Things Environment by Osama Z. Aletri, Kamran Ahmad Awan, Abdullah M. Alqahtani

    Published 2024-12-01
    “…TEO-IoT presents an end-to-end solution for security management and network traffic optimization, utilizing advanced algorithms for trust score estimation and anomaly detection. …”
    Get full text
    Article
  8. 2468

    Examination and the State of Intoxication: Features of Legal Regulation and Observance of Human Rights and Freedoms by M. A. Sambor

    Published 2020-06-01
    “…In other circumstances, such an examination of intoxication should be considered inadmissible evidence in an administrative offense case, since it was obtained in substantial violation of human rights and freedoms, including the right to liberty and security, as well as a number of other rights, which the detained person failed to exercise. …”
    Get full text
    Article
  9. 2469

    Violent crime motivated by war-related hate: concepts, signs, development trends by V. V. Sokurenko

    Published 2023-12-01
    “…Attention is focused on the fact that manifestations of violence and aggression in society pose a real threat to the stability of the existence of the entire human civilization, which carries potential threats to the national security of Ukraine, as well as to regional and global security. …”
    Get full text
    Article
  10. 2470

    An intrusion detection system for the prevention of an active sinkhole routing attack in Internet of things by Sabeen Tahir, Sheikh Tahir Bakhsh, Rayan A Alsemmeari

    Published 2019-11-01
    “…Therefore, the IoT network should be secured against intrusions and disruptions; the data exchanged throughout the network should be an encrypted form. …”
    Get full text
    Article
  11. 2471

    Research on Grid Scroll Chaotic Extended Sequence Algorithm and Its Circuit Implementation for F-OFDM System by Yingjie Ma, Ya Li, Geng Zhao, Ping Zeng, Yatao Yang

    Published 2019-01-01
    “…The proposed grid multiscroll chaotic maps are used as random phase sequence vectors instead of the traditional pseudo random sequence, which provide a large number of random sequences with good correlation characteristics, random characteristics, and high security. The proposed random phase sequence vectors can meet the needs of 5G mass connections. …”
    Get full text
    Article
  12. 2472

    Challenges in Microgrids with Medium Voltage Circuit by Hércules A. Oliveira, Luiza H. S. Santos, Luiz A. de S. Ribeiro, José G. de Matos, Lucas de P. A. Pinheiro

    Published 2025-01-01
    “…Effective coordination between protection devices and management systems ensures a rapid and selective response to faults, thereby enhancing microgrid security and facilitating efficient problem detection and resolution. …”
    Get full text
    Article
  13. 2473
  14. 2474
  15. 2475

    Dialogue as a tool of nutrition literacy in an agricultural intervention programme in Odisha, India by Rama Narayanan, Akshaya Kumar Panda, D. J. Nithya, R. V. Bhavani

    Published 2022-05-01
    “…Results The methodology of dialogue as a pedagogic tool generated a discussion about food security among the community. CHFs identified key messages and shared them with fellow villagers in imaginative ways. …”
    Get full text
    Article
  16. 2476

    Quarantine and anti-epidemic measures as an element of Emergency Law in Ukraine by O. O. Levytskyi

    Published 2023-10-01
    “…The development and improvement of quarantine and anti-epidemic measures in the system of Emergency Law is crucial for ensuring the security and resilience of society. Sustained changes in global threats, such as pandemics, require constant analysis, updating and improvement of the legal response mechanism. …”
    Get full text
    Article
  17. 2477

    Modeling the Internet of Things network for monitoring audio information on the Amazon platform by U. A. Vishniakou, B. H. Shaya

    Published 2021-08-01
    “…The algorithm for connecting devices to the AWS platform is given: creating a device certificate on the platform, creating a security policy, rules for processing information received from devices, and testing the network. …”
    Get full text
    Article
  18. 2478

    Baltic States in NATO: Results of the Decade by V. V. Vorotnikov

    Published 2014-12-01
    “…This satisfies demands of the political elites and victimized public consciousness for more security, makes it possible for elites to consider their states as bulwark against Russia. …”
    Get full text
    Article
  19. 2479

    Use of Extra-judicial Technical Surveillance in Criminal Decision-making: European Limitations and National Challenges by Andrei Zarafiu

    Published 2024-12-01
    “…The case law of the European Court of Human Rights in Strasbourg has consistently stated that even a severe threat to national security, such as acts of terrorism, or other risks of a global nature are not to be relied upon in order to override this form of protection and control. …”
    Get full text
    Article
  20. 2480

    A Scalable Framework for Sensor Data Ingestion and Real-Time Processing in Cloud Manufacturing by Massimo Pacella, Antonio Papa, Gabriele Papadia, Emiliano Fedeli

    Published 2025-01-01
    “…However, existing frameworks face challenges related to scalability, resource orchestration, and data security, particularly in rapidly evolving decentralized manufacturing settings. …”
    Get full text
    Article