Showing 901 - 920 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 901
  2. 902
  3. 903
  4. 904
  5. 905
  6. 906
  7. 907
  8. 908

    Harnessing the potential of shared data in a secure, inclusive, and resilient manner via multi-key homomorphic encryption by David Ha Eun Kang, Duhyeong Kim, Yongsoo Song, Dongwon Lee, Hyesun Kwak, Brian W. Anthony

    Published 2024-06-01
    “…Using the AI4I public predictive maintenance dataset, we demonstrate the MK-HELR algorithm, setting the stage for further research in secure, dynamic, and collaborative multi-party learning scenarios.…”
    Get full text
    Article
  9. 909
  10. 910

    Optimal Information Hiding: Advanced Bitstream-Based Watermarking for Secure and Efficient Integration of Image Data in Digital Videos by null Ramyashree, Venugopala P. S., Raghavendra S., null Sarojadevi

    Published 2024-01-01
    “…The outcomes underscore its practical viability for copyright protection, contributing to a more secure digital media landscape.…”
    Get full text
    Article
  11. 911

    EFFECT OF TRAINING ON CAREER PERFORMANCE OF NIGERIA SECURITY AND CIVIL DEFENSE CORPS (NSCDC) PERSONNEL IN KADUNA STATE COMMAND by LEKSHUM SUNDAY AMOS

    Published 2022-12-01
    “…It recommended among others that the NSCDC as a security organization should organize training on regular basis to improve the career performance of personnel of their organization in view of the current security challenges facing the country. …”
    Get full text
    Article
  12. 912

    A Federated Learning Framework for Enhanced Data Security and Cyber Intrusion Detection in Distributed Network of Underwater Drones by Mansahaj Singh Popli, Rudra Pratap Singh, Navneet Kaur Popli, Mohammad Mamun

    Published 2025-01-01
    “…This approach significantly improves data security by ensuring that sensitive information never leaves the local devices, reducing the risk of interception or compromise during transmission. …”
    Get full text
    Article
  13. 913

    EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks by Sakshi Patni, Joohyung Lee

    Published 2024-12-01
    “…We also create an access control system based on smart contracts and a secure multi-party computing protocol for model updates. …”
    Get full text
    Article
  14. 914
  15. 915
  16. 916
  17. 917
  18. 918
  19. 919
  20. 920

    A Comparative Study of Anomaly Detection Techniques for IoT Security Using Adaptive Machine Learning for IoT Threats by Dheyaaldin Alsalman

    Published 2024-01-01
    “…The results emphasize the promising prospects of FusionNet in security, healthcare, and other domains where accurate anomaly detection is crucial.…”
    Get full text
    Article