Showing 2,521 - 2,540 results of 5,943 for search '"security"', query time: 0.08s Refine Results
  1. 2521

    THE ANALYSIS OF THE KEY DRIVERS AND BARRIERS OF CLOUD MIGRATION IN COMPANIES IN BOSNIA AND HERZEGOVINA by Kasim Tatić, Zijad Džafić, Mahir Haračić, Merima Haračić

    Published 2020-05-01
    “…According to the research results, the most significant obstacles of cloud migration include the fo-llowing: lack of internal experts, privacy, lack of respo-nsibility of cloud providers in case of security incident, costs and complexity of migration to the cloud, etc. …”
    Get full text
    Article
  2. 2522

    XI2S-IDS: An Explainable Intelligent 2-Stage Intrusion Detection System by Maiada M. Mahmoud, Yasser Omar Youssef, Ayman A. Abdel-Hamid

    Published 2025-01-01
    “…By leveraging SHAP values, XI2S-IDS enhances transparency in decision-making, allowing security analysts to gain clear insights into feature importance and the model’s rationale. …”
    Get full text
    Article
  3. 2523

    STATE POLICY TO COUNTER CRIME IN BORDER REGIONS IN A DIGITAL SOCIETY by Maya G. Dieva, Dureja Z. Zijadova

    Published 2024-03-01
    “…The purpose of the scientific report is to summarize the criminal risks of digitalization for the national security of border regions and to analyze some areas of state policy in the field of combating crime in a digital society. …”
    Get full text
    Article
  4. 2524

    Quantum theory-inspired inter-sentence semantic interaction model for textual adversarial defense by Jiacheng Huang, Long Chen, Xiaoyin Yi, Ning Yu

    Published 2024-12-01
    “…Abstract Deep neural networks have a recognized susceptibility to diverse forms of adversarial attacks in the field of natural language processing and such a security issue poses substantial security risks and erodes trust in artificial intelligence applications among people who use them. …”
    Get full text
    Article
  5. 2525

    A Survey of Post-Quantum Cryptography Migration in Vehicles by Nils Lohmiller, Sabrina Kaniewski, Michael Menth, Tobias Heer

    Published 2025-01-01
    “…A promising solution to ensure the continued security attributes of confidentiality, integrity, and availability is the use of Post-Quantum Cryptography (PQC) algorithms. …”
    Get full text
    Article
  6. 2526

    ASSESSING THE QUALITY OF MICROSERVICE AND MONOLITHIC-BASED ARCHITECTURES: A SYSTEMATIC LITERATURE REVIEW by Saad Hussein, Mariam Lahami, Mouna Torjmen

    Published 2024-06-01
    “…The outcome of the literature review brings forth the key quality attributes in addition to their sub-characteristics as follows: performance, scalability, coupling, cohesion, deployment, security, development, complexity, maintainability, and availability. …”
    Get full text
    Article
  7. 2527
  8. 2528

    Emergency nurses’ disaster preparedness competencies: A focused mapping review and synthesis by Tshepo L. Motsepe, Shelley Schmollgruber

    Published 2025-01-01
    “…Conclusion: Communication, incident management, safety and security, preparedness and planning are the most identified integral domains within other identified domains. …”
    Get full text
    Article
  9. 2529

    Migration and Residual Trapping of Immiscible Fluids during Cyclic Injection: Pore-Scale Observation and Quantitative Analysis by Haejin Ahn, Seon-Ok Kim, Minhee Lee, Sookyun Wang

    Published 2020-01-01
    “…In GCS operations, residual trapping is the most favorable form of a trapping mechanism because of its storage security and capacity. In this study, the effects of cyclic injection of CO2-water on the immiscible displacement and residual trapping in pore networks were examined. …”
    Get full text
    Article
  10. 2530

    Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices by Gabriela Cagua, Valerie Gauthier-Umana, Carlos Lozano-Garzon

    Published 2025-01-01
    “…While this expansion drives significant advancements across industries, it also introduces critical challenges in ensuring secure device communication. IoT devices often operate under strict constraints in processing power, memory, and energy consumption, complicating the implementation of robust security measures. …”
    Get full text
    Article
  11. 2531

    Criminological Scenarios of Crime Situation’s Transformation in the Context of Armed Conflict on Donbass in the Midterm by O. О. Titarenko

    Published 2019-09-01
    “…The author has expertly substantiated the highest probability of developing a crime situation in the midterm in the following three scenarios: “Stagnation and slight increase” (most realistic), “Control and security” (optimistic), “Turbulent crime” (negative). …”
    Get full text
    Article
  12. 2532

    Overcrowding in prisons: Health and legal implications by Eva Nudd, Maha Aon, Kalliopi Kambanella, Marie Brasholt

    Published 2024-01-01
    “…Beyond the harm caused to persons in prisons, this may negatively impact society at large in terms of security, public health, and economy. Political will is essential in reducing prison overcrowding.…”
    Get full text
    Article
  13. 2533

    The EU Cooperation with South African Countries: Main Trends and Prospects for Development by Savchenko Maryna V., Apeniuk Anna I., Skladaniuk Darina M.

    Published 2024-06-01
    “…Stronger cooperation can contribute to economic growth, development, peace, and security.…”
    Get full text
    Article
  14. 2534

    An Enhanced LSTM Approach for Detecting IoT-Based DDoS Attacks Using Honeypot Data by Arjun Kumar Bose Arnob, M. F. Mridha, Mejdl Safran, Md Amiruzzaman, Md. Rajibul Islam

    Published 2025-02-01
    “…Abstract One of the widening perils in network security is the Distributed Denial of Service (DDoS) attacks on the Internet of Things (IoT) ecosystem. …”
    Get full text
    Article
  15. 2535

    A New Chaotic Color Image Encryption Algorithm Based on Memristor Model and Random Hybrid Transforms by Yexia Yao, Xuemei Xu, Zhaohui Jiang

    Published 2025-01-01
    “…These findings indicate that the SEME-TDHM algorithm successfully encrypts color images, providing strong security and practical utility.…”
    Get full text
    Article
  16. 2536

    Anomaly detection of adversarial cyber attacks on electric vehicle charging stations by Sagar Babu Mitikiri, Vedantham Lakshmi Srinivas, Mayukha Pal

    Published 2025-03-01
    “…Intruders pose potential risks to the security, reliability, and functionality of the EVCI, by spoofing the data through these charging ports leading to anomalies in the data. …”
    Get full text
    Article
  17. 2537

    Investigating the blockchain technologies influences on the performance of road freight transportation management systems using network analysis technique by Ahmad Negravi, Omid Titidezh

    Published 2023-09-01
    “…The transparency technology has influenced time and trust and security by 22.63% and 77.37%, respectively, and smart contracts affected the two above waste categories by 88.81% and 11.19%, respectively. …”
    Get full text
    Article
  18. 2538

    U.S. plans to internationalize the containment of the USSR in the Balkans in the first half of the 1950s by A. A. Kalinin

    Published 2020-12-01
    “…In response, in the early 1950s the United States formed a new security model in the Balkans, which based on a differentiated approach: Greece became a member of NATO, while Yugoslavia entered the anti-Soviet Balkan Pact affiliated with NATO. …”
    Get full text
    Article
  19. 2539

    Nicolai Vasilyevich Ivanov: addition to biography of chekist-transport worker by V. P. Vasilevsky, A. V. Sushko

    Published 2020-02-01
    “…The article deals with the biography reconstruction of the chekist-transport worker (public security officer) N. V. Ivanov. The authors comes to the conclusion that the life and fate of N. …”
    Get full text
    Article
  20. 2540