Showing 8,681 - 8,700 results of 9,720 for search '"security"', query time: 0.15s Refine Results
  1. 8681

    A comparative study of dynamic risk spillovers among financial sectors in China before and after the epidemic. by Cuicui Liu, HuiZi Ma, Xiangrong Wang, Junfu Cui, Xu Shen

    Published 2024-01-01
    “…This paper takes the unexpected event of the new coronavirus as the research background, selects the daily closing price data of the financial sectors (banking, insurance, securities, and multifinance) from 20 June 2017 to 31 December 2023. …”
    Get full text
    Article
  2. 8682

    Cross-Border Printing Privileges in the Seventeenth-Century Low Countries by Nina Lamal

    Published 2024-12-01
    “…Rather than seeing these cross-border privileges solely as a way for printers to expand the reach and commercial viability of their published works, this article demonstrates that, by securing privileges from multiple authorities, printers showed they were able to navigate the market for institutions and complex networks of power. …”
    Get full text
    Article
  3. 8683

    Time synchronization attack detection for industrial wireless network by Sichao ZHANG, Wei LIANG, Xudong YUAN, Yinlong ZHANG, Meng ZHENG

    Published 2023-06-01
    “…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
    Get full text
    Article
  4. 8684

    What determines investment in the Nippon Individual Savings Account? an investigation of Japan's tax-exempt investment account. by Takuya Katauke, Mostafa Saidur Rahim Khan, Yoshihiko Kadoya

    Published 2025-01-01
    “…Taking advantage of the launch of the revamped NISA, we analyzed data collected in late 2022 of 95,632 active investors in a leading securities company to explore their preferences in the previous NISA. …”
    Get full text
    Article
  5. 8685

    Anonymous access protocol for media independent information service by LI Guang-song1, MA Jian-feng1, JIANG Qi1

    Published 2010-01-01
    “…For anonymous access requirements of media independent information service(MIIS) in heterogeneous networks,an access protocol with user anonymity was proposed.With the aid of the home server,the mobile user and the information server mutually authenticated each other while keeping the mobile user anonymous.Compared with other schemes,the proposed protocol has better performance,and it is provably secure in the CK model.…”
    Get full text
    Article
  6. 8686

    U.S. strategy in Central Asia by V. N. Zemskov

    Published 2013-04-01
    “…In this connection, the author notes that successive governments of the USA, the American political and expert community, business circles traditionally in the last twenty years pay particular attention to this region, bringing to secure the U.S. presence in the region the concept of "Big Central Asia".…”
    Get full text
    Article
  7. 8687

    Oil and Iran Regions Rural Economic Structure Alteration by Hassan Afrakhteh, Mohammad Hajipur, Farhad Javan

    Published 2018-03-01
    “…The oil has gradually obtained a predominant place in national economy since 1950 and nowadays, is the main important resource securing country financial needs. Two questions are the base of this research regarding contradiction of oil rent and traditional economic sectors including agriculture and livestock rearing which always have been intensified. …”
    Get full text
    Article
  8. 8688

    An Efficient Cluster Authentication Scheme Based on VANET Environment in M2M Application by You-Boo Jeon, Keun-Ho Lee, Doo-Soon Park, Chang-Sung Jeong

    Published 2013-11-01
    “…We have successfully included the establishment of secure channels, the detection of replay attacks, mutual cluster authentication, prevention of vehicle identity fabrication, and secure distribution of provisional session key.…”
    Get full text
    Article
  9. 8689

    A STUDY PROPOSING IMPROVEMENTS TO OVERLAY NETWORK ARCHITECTURE TO MITIGATE THE IMPACT OF DISTRIBUTED DENIAL-OF-SERVICE ATTACKS ON WEBSITE SYSTEMS by Vu Thi Phuong*, Nguyen Van Vu, Dang Thi Hien

    Published 2024-12-01
    “…This architecture employs a group of Secure Overlay Access Points (SOAP) to authenticate and distinguish legitimate users from malicious attackers, ensuring that valid requests are routed to hidden nodes within the overlay network via Secure Sockets Layer (SSL) connections. …”
    Get full text
    Article
  10. 8690

    Forest pest monitoring and early warning using UAV remote sensing and computer vision techniques by Xiaoyu Li, AChuan Wang

    Published 2025-01-01
    “…To address this challenge, we propose SC-RTDETR, a novel framework for secure and robust object detection in forest pest monitoring using UAV imagery. …”
    Get full text
    Article
  11. 8691

    ORGANIZATIONAL AND LEGAL ASPECTS OF THE REGULATION OF LABOR RELATIONS OF AN EDUCATIONAL ORGANIZATION AND AN ADVISER TO THE DIRECTOR OF EDUCATION by Elena V. Bezvikonnaya, Andrey A. Savkin

    Published 2024-07-01
    “…Law enforcement practice demonstrates problems in the field of concluding an employment contract and its essential conditions, securing a list of labor functions, securing a position in the staffing table, calculating wages, etc. …”
    Get full text
    Article
  12. 8692

    Employer Sponsored Retirement Savings Plans by Rachel Dorman, Lisa M. Leslie, Michael S. Gutter, Martie Gillen, Josephine Turner

    Published 2012-05-01
    “…A financially secure retirement is a goal for many workers, and the ability to achieve that plan can be helped by employer-sponsored retirement plans. …”
    Get full text
    Article
  13. 8693

    Employer Sponsored Retirement Savings Plans by Rachel Dorman, Lisa M. Leslie, Michael S. Gutter, Martie Gillen, Josephine Turner

    Published 2012-05-01
    “…A financially secure retirement is a goal for many workers, and the ability to achieve that plan can be helped by employer-sponsored retirement plans. …”
    Get full text
    Article
  14. 8694

    Empowering drones in vehicular network through fog computing and blockchain technology. by Shivani Wadhwa, Divya Gupta, Shalli Rani, Maha Driss, Wadii Boulila

    Published 2025-01-01
    “…The contribution includes a systematic architecture design and integration of blockchain technology for secure data storage. Fog computing was introduced for the Drone with Blockchain Technology (FCDBT) model, where drones collaborate to process IoT data efficiently. …”
    Get full text
    Article
  15. 8695

    False Financial Statement Identification Based on Fuzzy C-Means Algorithm by Jixiao Li

    Published 2021-01-01
    “…In the discussion of this paper, most of the information comes from the annual reports of companies, administrative penalty decisions of the Securities Regulatory Commission, and some information comes from research reports made by securities institutions, which are limited sources of information. …”
    Get full text
    Article
  16. 8696

    Comparison of Insertion Characteristics of Prewarmed Igel and I-gel at Room Temperature in Adult Patients Undergoing Elective Surgeries- A Randomized Control Trial by Priyanka Pathak, Mushtaq Wani, Heena Saini

    Published 2025-01-01
    “…In Group C, airway was secured with Igel at room temperature. In Group W, patients airway was secured with I-gel which was prewarmed at 42˚Celsius. …”
    Get full text
    Article
  17. 8697

    Integrity of Best-Answer Assignments in Large Enrollment Classes; the role of Compulsory Attribution by Kurt Schmitz, Veda Storey

    Published 2024-12-01
    “…A unique feature that makes this method well-suited to large enrollment classes is the ability to secure and, when necessary, to delete stolen work, thereby precluding misappropriation. …”
    Get full text
    Article
  18. 8698

    Modern tendencies of functioning of nongovernmental pension funds in the system of obligatory pension insurance by Gulnara Fatkhlislamova

    Published 2019-03-01
    “…The article defines the strategy of investing APFs in various classes of assets during the study period, it has been revealed that of the total amount of invested pension savings in corporate securities, 2/3 of them fall on NPF investments. Over the last analyzed period, there has been a sharp increase in the investment of pension savings of NPFs in government securities, which is largely due to the tightening of regulatory requirements for the risk level of portfolio investment. …”
    Get full text
    Article
  19. 8699

    Identity-based ring signature scheme under standard model by ZHANG Yue-yu, LI Hui, WANG Yu-min

    Published 2008-01-01
    “…An identity based ring signature scheme using the method of Waters for constructing private key was presented. This scheme is secure in the standard model under the computational Diffie-Hellman assumption. …”
    Get full text
    Article
  20. 8700

    Kink of Subclavian Artery Mimicking Stenosis by Hatice S. Kemal, Aziz Gunsel, Murat Kocaoglu, Levent Cerit, Hamza Duygu

    Published 2016-01-01
    “…In this asymptomatic case, we have merged clinical and multiple imaging modalities to secure the diagnosis and treatment plan.…”
    Get full text
    Article