Showing 861 - 880 results of 5,943 for search '"security"', query time: 0.09s Refine Results
  1. 861

    A secure and robust color image watermarking method using SVD and GAT in the multiresolution DCHWT domain by Boubakeur Latreche, Hilal Naimi, Slami Saadi

    Published 2023-11-01
    “…In this approach, the pre-processing phase employs successive generalized Arnold transforms to encrypt the RGB watermark layers, significantly enhancing the security of the watermarking algorithm. Subsequently, the blue layer of the host image undergoes R-level 2D-DCHWT processing. …”
    Get full text
    Article
  2. 862
  3. 863

    Blockchain-Assisted Hierarchical Attribute-Based Encryption Scheme for Secure Information Sharing in Industrial Internet of Things by A. Sasikumar, Logesh Ravi, Malathi Devarajan, A. Selvalakshmi, Abdulaziz Turki Almaktoom, Abdulaziz S. Almazyad, Guojiang Xiong, Ali Wagdy Mohamed

    Published 2024-01-01
    “…The analyses and experimental findings show that the proposed blockchain-integrated edge computing architecture is better than the existing schemes in terms of data sharing, data privacy, and security.…”
    Get full text
    Article
  4. 864

    Application of Image Denoising Method Based on Two-Way Coupling Diffusion Equation in Public Security Forensics by Yiqun Wang, Changpeng He, Zhenjiang Li

    Published 2021-01-01
    “…The problem of diversification of the use and application modes of multiple police types is solved; the video image evidence is managed in a centralized storage, audit, and export method, and the security and authenticity of the evidence are solved. …”
    Get full text
    Article
  5. 865

    Systems Thinking Safety Analysis: Nuclear Security Assessment of Physical Protection System in Nuclear Power Plants by Tae Ho Woo

    Published 2013-01-01
    “…The dynamical assessment has been performed in the aspect of the nuclear power plants (NPPs) security. The physical protection system (PPS) is constructed by the cyber security evaluation tool (CSET) for the nuclear security assessment. …”
    Get full text
    Article
  6. 866
  7. 867

    Temporal Convolutional Network Approach to Secure Open Charge Point Protocol (OCPP) in Electric Vehicle Charging by Ikram Benfarhat, Vik Tor Goh, Chun Lim Siow, Muhammad Sheraz, Teong Chee Chuah

    Published 2025-01-01
    “…Securing data transactions across computer networks presents significant challenges, particularly concerning data privacy and cybersecurity threats. …”
    Get full text
    Article
  8. 868

    Singapore Government Securitization Measures against Transboundary Haze Pollution as a Non-Traditional Security Threat by Muhammad Ramli

    Published 2025-01-01
    “…It can be inferred that the government possesses complete authority to secure the smog issue. The community's response is critical in determining the success of haze securitization. …”
    Get full text
    Article
  9. 869

    An explanatory case report about critical differences of ‘inability to work’ in Italian welfare and social security systems by Michele Sammicheli, Marcella Scaglione

    Published 2019-03-01
    “…In Italy, there is a different status of ‘inability to work’ in civil invalidity and INPS social security insurance systems. These differences and overlaps cause some concerns. …”
    Get full text
    Article
  10. 870
  11. 871
  12. 872

    An Improved Clustering Method for Detection System of Public Security Events Based on Genetic Algorithm and Semisupervised Learning by Heng Wang, Zhenzhen Zhao, Zhiwei Guo, Zhenfeng Wang, Guangyin Xu

    Published 2017-01-01
    “…In this paper, a detecting system for public security events is designed, which carries out clustering operation to cluster relevant text data, in order to benefit relevant departments by evaluation and handling. …”
    Get full text
    Article
  13. 873
  14. 874
  15. 875

    Sql injection detection using Naïve Bayes classifier: A probabilistic approach for web application security by Lu Zhexi

    Published 2025-01-01
    “…A pervasive security issue in web applications is database injection, enabling attackers to alter SQL queries in order to get unauthorized access to confidential information. …”
    Get full text
    Article
  16. 876

    Research on Food Security Risk Assessment and Early Warning in China Based on BP Neural Network Model by Yuke Hou, Xin Liang

    Published 2022-01-01
    “…According to the influencing factors in food security, this paper uses the PCA method and the AHP method to construct a food security early warning index system that includes 4 secondary indicators and 13 tertiary indicators of total security, trade security, ecological security, and food security. …”
    Get full text
    Article
  17. 877
  18. 878
  19. 879
  20. 880