Showing 281 - 300 results of 9,720 for search '"security"', query time: 0.06s Refine Results
  1. 281

    SIM: a secure IP protocol for MANET by Rong-sen LI, Wen-hua DOU

    Published 2013-08-01
    Subjects: “…secure IP protocol for manet…”
    Get full text
    Article
  2. 282
  3. 283
  4. 284
  5. 285
  6. 286
  7. 287
  8. 288

    Western Experience in Strategic Planning for National Security by V. P. Nazarov

    Published 2019-11-01
    “…The purpose of this article is to provide an overview of the best Western practices in strategic planning with the view to improve the effectiveness of the Russian Federation national security policy in the face of new challenges and threats.Having analyzed Western approaches to ensuring national security, the article concludes that the political and governance practice needs to include more of strategic planning elements, such as strategic forecasting, monitoring, and national security assessment. …”
    Get full text
    Article
  9. 289

    A survey of security threats in federated learning by Yunhao Feng, Yanming Guo, Yinjian Hou, Yulun Wu, Mingrui Lao, Tianyuan Yu, Gang Liu

    Published 2025-01-01
    “…We also sort out the relationship between these methods, their advantages and disadvantages, and discuss future research directions regarding the security issues of federated learning from multiple perspectives.…”
    Get full text
    Article
  10. 290

    Canadian perspectives on food security and plant breeding by Claire Williams, Savannah Gleim, Stuart J. Smyth

    Published 2021-04-01
    “…Abstract Background The broadness of biotechnology serves to connect different types of modern plant breeding techniques with the potential to improve global food security. However, the topic goes beyond the specific example consumers’ associate with the term—genetic modification. …”
    Get full text
    Article
  11. 291
  12. 292
  13. 293
  14. 294
  15. 295

    Secure video watermarking scheme for broadcast monitoring by LIU Li1, PENG Dai-yuan2, LI Xiao-ju1

    Published 2009-01-01
    “…This new robust video watermark algorithm could also be applied in the security of broadcast monitoring. Based on the academic analysis and experimental results, the new proposed algorithm has good security and robust performance.…”
    Get full text
    Article
  16. 296
  17. 297
  18. 298
  19. 299

    Evolution of Theoretical Approaches to the Study of Debt Security by Kirov Bohdan S.

    Published 2024-06-01
    Subjects: “…debt security…”
    Get full text
    Article
  20. 300