Showing 1,841 - 1,860 results of 5,943 for search '"security"', query time: 0.09s Refine Results
  1. 1841
  2. 1842

    Design and Implementation of a Data Sharing Model for Improving Blockchain Technology by Xiaowei Wang

    Published 2022-01-01
    “…Thus, data sharing and security are vital to realizing the value of the data. …”
    Get full text
    Article
  3. 1843
  4. 1844

    Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing Mechanism by Meng Wang, Zhide Chen, Li Xu, Huan Zhan

    Published 2014-01-01
    “…This control mechanism for benign worm propagation is of guiding significance to control the network security.…”
    Get full text
    Article
  5. 1845
  6. 1846

    Automating Risk Analysis of Software Design Models by Maxime Frydman, Guifré Ruiz, Elisa Heymann, Eduardo César, Barton P. Miller

    Published 2014-01-01
    “…Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. …”
    Get full text
    Article
  7. 1847

    Public Housing Allocation Model in the Guangdong-Hong Kong-Macao Greater Bay Area under Clustering Algorithm by Lei Zhang, Xueqing Hu

    Published 2021-01-01
    “…The allocation method of public housing based on demand clustering analysis focuses on improving the housing security level and strives to meet the higher-level housing improvement needs of housing security objects, so as to provide security objects with more expected living conditions and improve housing allocation effect.…”
    Get full text
    Article
  8. 1848

    PREVENTING VIOLENCE CRIMES (KIDNAPPING, ARMED ROBBERY, BRIGANDAGE OR COMMUNITY MASSACRE) WITH DRONES: AN EFFECTIVE ALTERNATIVE TO VEHICULAR PATROLS IN NIGERIA by BABALOLA SUNDAY EMMANUEL

    Published 2024-07-01
    “… Security is a vital component of any Nation’s growth and development, with its absence, there is no progress. …”
    Get full text
    Article
  9. 1849
  10. 1850

    Modeling and Analysis of the Spread of Malware with the Influence of User Awareness by Qingyi Zhu, Xuhang Luo, Yuhang Liu

    Published 2021-01-01
    “…By incorporating the security awareness of computer users into the susceptible-infected-susceptible (SIS) model, this study proposes a new malware propagation model, named the SID model, where D compartment denotes the group of nodes with user awareness. …”
    Get full text
    Article
  11. 1851
  12. 1852
  13. 1853

    Towards a Severity Assessment Method for Potential Cyber Attacks to Connected and Autonomous Vehicles by Qiyi He, Xiaolin Meng, Rong Qu

    Published 2020-01-01
    “…According to the UK CAV Cyber Security Principles, preventing CAVs from cyber security attacks need to be considered at the beginning of CAV development. …”
    Get full text
    Article
  14. 1854
  15. 1855

    Framework to analyze and exploit the smart home IoT firmware by Keshav Kaushik, Akashdeep Bhardwaj, Susheela Dahiya

    Published 2025-02-01
    “…Thousands of smart gadgets are linked to the internet each month, and due to various privacy and security issues, such devices may be vulnerable to evil attackers. …”
    Get full text
    Article
  16. 1856
  17. 1857
  18. 1858

    Blockchain-Driven Optimized Chaotic Encryption Scheme for Medical Image Transmission in IoT-Edge Environment by Goli Archana, Rajeev Goyal, K. M. V. Madan Kumar

    Published 2025-01-01
    “…The evaluation metrics like as NACI, UACI, Entropy and standard verification methods such as NIST standard tests are deployed and analyzed. To prove it security strength, proposed secured BC framework is compared with the wide-variety of secured frameworks. …”
    Get full text
    Article
  19. 1859

    Optimalisasi Strategi Intelijen dalam Menghadapi Ancaman TPPO Jaringan Kamboja dan Implikasinya bagi Keamanan Nasional by Gidion Jhon Putra

    Published 2024-12-01
    “…The study aims to analyze the causal factors, the level of threat to national security, and the intelligence strategy in preventive efforts. …”
    Get full text
    Article
  20. 1860