Showing 2,801 - 2,820 results of 5,943 for search '"security"', query time: 0.09s Refine Results
  1. 2801
  2. 2802

    Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks by Mohammed Almehdhar, Abdullatif Albaseer, Muhammad Asif Khan, Mohamed Abdallah, Hamid Menouar, Saif Al-Kuwari, Ala Al-Fuqaha

    Published 2024-01-01
    “…Based on our thorough analysis, we identify key limitations in current methodologies and propose potential paths for future research, focusing on integrating real-time data analysis, cross-layer security measures, and collaborative IDS frameworks.…”
    Get full text
    Article
  3. 2803

    Design a Robust DDoS Attack Detection and Mitigation Scheme in SDN-Edge-IoT by Leveraging Machine Learning by Habtamu Molla Belachew, Mulatu Yirga Beyene, Abinet Bizuayehu Desta, Behaylu Tadele Alemu, Salahadin Seid Musa, Alemu Jorgi Muhammed

    Published 2025-01-01
    “…However, the complexity of IoT networks, with their resource-constrained devices, presents substantial security challenges, particularly Distributed Denial of Service (DDoS) attacks. …”
    Get full text
    Article
  4. 2804

    Permanent aquifer storage loss from long-term groundwater withdrawal: A case study of subsidence in Bandung (Indonesia) by Michelle Rygus, Marco Bianchi, Alessandro Novellino, Ekbal Hussain, Ahmad Taufiq, Steven Reinaldo Rusli, Dwi Sarah, Claudia Meisina

    Published 2025-02-01
    “…Our study is one of the first examples of using satellite data with geomechanical models to constrain groundwater extraction rates and emphasises the importance of remote sensing data in groundwater resource management, and the irreversible impact of unsustainable groundwater extraction, which has implications for long term water security. New Hydrological Insights for the Region: The study found that continued industrial groundwater extraction has resulted in permanent aquifer storage loss, with significant implications for long-term water security. …”
    Get full text
    Article
  5. 2805

    Multi‐objective multiperiod stable environmental economic power dispatch considering probabilistic wind and solar PV generation by Aamir Ali, Sumbal Aslam, Sohrab Mirsaeidi, Noor Hussain Mugheri, Riaz Hussain Memon, Ghulam Abbas, Hammad Alnuman

    Published 2024-12-01
    “…Abstract The economic‐environmental power dispatch (EEPD) problem, a widely studied bi‐objective non‐linear optimization challenge in power systems, traditionally focuses on the economic dispatch of thermal generators without considering network security constraints. However, environmental sustainability necessitates reducing emissions and increasing the penetration of renewable energy sources (RES) into the electrical grid. …”
    Get full text
    Article
  6. 2806
  7. 2807

    Dynamic Key Replacement Mechanism for Lightweight Internet of Things Microcontrollers to Resist Side-Channel Attacks by Chung-Wei Kuo, Wei Wei, Chun-Chang Lin, Yu-Yi Hong, Jia-Ruei Liu, Kuo-Yu Tsai

    Published 2025-01-01
    “…The lightweight D-H key exchange ensures that even resource-constrained IoT devices can securely perform key exchanges without significant computational overhead. …”
    Get full text
    Article
  8. 2808
  9. 2809

    The U.S. Assistance to the MENA Arab Countries under the Trump Administration: The Logic of a Diff erentiated Approach by V. I. Bartenev

    Published 2020-12-01
    “…The assistance to Cairo and Amman is ringfenced and protected, while aid to other recipients, including security assistance and FMF grants, is prone to quite drastic cuts. …”
    Get full text
    Article
  10. 2810
  11. 2811
  12. 2812

    Financial Innovations and Financial Inclusion Among Commercial Banks in Uganda: Case Study Of Kabale District. by Mpirirwe, Christine

    Published 2023
    “…As more clients choose mobile banking, the report advises banking institutions to develop measures to improve security in the platform. The report also advises making these platforms straightforward and simple to use in order to attract more users to the business. …”
    Get full text
    Thesis
  13. 2813

    The Contribution of Micro Finance Institutions on the Growth of Small and Medium Business : A Case Study of North Kigezi Diocese Sacco In Rukungiri Municipality. by Ainembabazi, Wensi

    Published 2023
    “…Findings from the study established that the requirements for accessing credit services from North Kigezi SACCO by small-scale enterprises include; collateral security, being an active member, Local Council letter, and having guarantor, among other requirements. …”
    Get full text
    Thesis
  14. 2814

    Development theory and practice in a changing world / by Carmody, Pádraig

    Published 2019
    Table of Contents: “…-- The role of the state : "developmental states", geopolitics, industrialisation, and security -- Deconstructing development : postmodernism and decoloniality -- Aid, development and South-South cooperation? …”
    View in OPAC
    Electronic eBook
  15. 2815

    Survey on Byzantine attacks and defenses in federated learning by ZHAO Xiaojie, SHI Jinqiao, HUANG Mei, KE Zhenhan, SHEN Liyan

    Published 2024-12-01
    “…Secondly, guided by the classic network security defense model, federated learning defense methods were classified and analyzed from the perspective of defense mechanisms. …”
    Get full text
    Article
  16. 2816

    Floridians’ Perceptions of GMOs: GMOs and Florida Citrus by Nicole M. W. Dodds, Laura M. Gorham, Joy N. Rumble

    Published 2014-10-01
    “… Worldwide and in Florida, food-related issues such as food safety, food security, and use of new food technologies continue to be top concerns. …”
    Get full text
    Article
  17. 2817

    Application of fuzzy modeling in the evaluation of crisis state of enterprises by M. N. Belousova, A. A. Dashkov

    Published 2019-04-01
    “…In the model of a fuzzy assessment of the crisis state of enterprises, the following input linguistic variables have been highlighted: the relative level of financial status, the probability of bankruptcy, the level of information security, the level of innovation potential. The terms of the input variables and the result variable have been described. …”
    Get full text
    Article
  18. 2818

    The New Trend in the EU’s Migration Policy: Is Externalization Any Better? by Vasil Pavlov, Raquel Cardoso

    Published 2024-12-01
    “… The highly dynamic security environment, characterized by numerous disturbances such as armed conflicts, civil wars, and political and social instability in various parts of the world, has led millions of people to flee their countries of origin – as of 2023, this number is 117,3 million. …”
    Get full text
    Article
  19. 2819

    Decision-Making under Pillars Two and Three by Petr Jeřábek

    Published 2009-12-01
    “…The second pillar is connected with Common Foreign and Security Policy, while the third pillar contributes with Justice and Home Affairs. …”
    Get full text
    Article
  20. 2820

    Comme une aiguille sur un sillon d’asphalte by Julien Glauser

    Published 2021-12-01
    “…Through his work with skateboarders in Tokyo, the author shows how the search for spots - places that are good for skating - and the observation of security measures transform the skaters' perception of their environment. …”
    Get full text
    Article