Showing 841 - 860 results of 9,720 for search '"security"', query time: 0.09s Refine Results
  1. 841

    HERDSMEN AND FARMERS CLASHES IN NORTH CENTRAL NIGERIA: NATIONAL SECURITY IMPLICATIONS by ANGELA AJODO-ADEBANJOKO, ROSEMARY IJEOMA NWOFOR

    Published 2024-07-01
    “…This paper examines the national security implications of herdsmen and farmers conflict on Nigerian national security. …”
    Get full text
    Article
  2. 842
  3. 843
  4. 844

    Research on national security risk assessment model of open government data by Biao WANG, Xingyang LIU, Ka XU, Wangyang LIU, Kenan WANG, Yuqing XIA

    Published 2020-12-01
    “…As an important strategic resource of national and social development,the government open data is of great value.But China lack standards in the security risk assessment of government open data,especially the security of national data is at risk.Based on the theory of information security risk assessment,a government open data security risk assessment model was constructed with national security assets,open data vulnerability and security threat as the main security risk elements.Analytic hierarchy process (AHP) and fuzzy comprehensive evaluation methods were used to quantify and evaluate the security risks of government open data,and the validity of the model is verified by example.…”
    Get full text
    Article
  5. 845
  6. 846
  7. 847
  8. 848
  9. 849
  10. 850
  11. 851
  12. 852

    BRS-Based Robust Secure Localization Algorithm for Wireless Sensor Networks by Ning Yu, Lirui Zhang, Yongji Ren

    Published 2013-03-01
    “…Localization is the key supporting technology for wireless sensor networks (WSNs). Security and accuracy are the premise of the localization application. …”
    Get full text
    Article
  13. 853
  14. 854
  15. 855

    UCAP:a PCL secure user authentication protocol in cloud computing by Xuefeng LI, Junwei ZHANG, Jianfeng MA

    Published 2018-08-01
    “…As the combine of cloud computing and Internet breeds many flexible IT services,cloud computing becomes more and more significant.In cloud computing,a user should be authenticated by a trusted third party or a certification authority before using cloud applications and services.Based on this,a protocol composition logic (PCL) secure user authentication protocol named UCAP for cloud computing was proposed.The protocol used a symmetric encryption symmetric encryption based on a trusted third party to achieve the authentication and confidentiality of the protocol session,which comprised the initial authentication phase and the re-authentication phase.In the initial authentication phase,the trusted third party generated a root communication session key.In the re-authentication phase,communication users negotiated a sub session key without the trusted third party.To verify the security properties of the protocol,a sequential compositional proof method was used under the protocol composition logic model.Compared with certain related works,the proposed protocol satisfies the PCL security.The performance of the initial authentication phase in the proposed scheme is slightly better than that of the existing schemes,while the performance of the re-authentication phase is better than that of other protocols due to the absence of the trusted third party.Through the analysis results,the proposed protocol is suitable for the mutual authentication in cloud computing.…”
    Get full text
    Article
  16. 856
  17. 857
  18. 858

    Cyber Security Intrusion Detection Using a Deep Learning Method by Basheer Ullah, Shafiq-ur-Rehman Massan, M. Abdul Rehman, Rabia Ali Khan

    Published 2025-01-01
    “…The World is moving towards information technology dependence, the cornerstone of which is information security. As the number of active connections becomes large so is the need of security increasing day by day. …”
    Get full text
    Article
  19. 859
  20. 860