Showing 1,881 - 1,900 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 1881
  2. 1882

    Malware Detection in Self-Driving Vehicles Using Machine Learning Algorithms by Seunghyun Park, Jin-Young Choi

    Published 2020-01-01
    “…Thus, intrusion detection is a key network security function in vehicles with open connectivity, such as self-driving and connected cars. …”
    Get full text
    Article
  3. 1883

    Film and Television Animation Sensing and Visual Image by Computer Digital Image Technology by Lu Lian, Tong Lei

    Published 2022-01-01
    “…The proposed steganographic image enhancement algorithm by image preprocessing has higher security and better image enhancement effect.…”
    Get full text
    Article
  4. 1884

    An Attribute-Based Encryption Scheme with Revocation for Fine-Grained Access Control in Wireless Body Area Networks by Ye Tian, Yanbin Peng, Xinguang Peng, Hongbin Li

    Published 2014-11-01
    “…Our scheme provides confidentiality, security, and resistance to collusion attack. We analyze the correctness, security, and energy consumption of the scheme.…”
    Get full text
    Article
  5. 1885
  6. 1886

    A Survey on Event Tracking in Social Media Data Streams by Zixuan Han, Leilei Shi, Lu Liu, Liang Jiang, Jiawei Fang, Fanyuan Lin, Jinjuan Zhang, John Panneerselvam, Nick Antonopoulos

    Published 2024-03-01
    “…Event tracking in social networks finds various applications, such as network security and societal governance, which involves analyzing data generated by user groups on social networks in real time. …”
    Get full text
    Article
  7. 1887

    Intelligent two-phase dual authentication framework for Internet of Medical Things by Muhammad Asif, Mohammad Abrar, Abdu Salam, Farhan Amin, Faizan Ullah, Sabir Shah, Hussain AlSalman

    Published 2025-01-01
    “…The security resilience was also evaluated against man-in-the-middle, replay, and brute force attacks. …”
    Get full text
    Article
  8. 1888

    An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks by Shahwar Ali, A Humaria, M Sher Ramzan, Imran Khan, Syed M Saqlain, Anwar Ghani, J Zakia, Bander A Alzahrani

    Published 2020-06-01
    “…The sensors in wireless sensor networks are resource-constrained devices whereas the existing data security approaches have complex security mechanisms with high computational and response times affecting the network lifetime. …”
    Get full text
    Article
  9. 1889
  10. 1890
  11. 1891
  12. 1892

    Strongly Unforgeable Ring Signature Scheme from Lattices in the Standard Model by Geontae Noh, Ji Young Chun, Ik Rae Jeong

    Published 2014-01-01
    “…Lattice-based ring signature schemes offer lower computational overhead and security from quantum attacks. In this paper, we offer a lattice-based scheme. …”
    Get full text
    Article
  13. 1893
  14. 1894
  15. 1895

    Building Application-Related Patient Identifiers: What Solution for a European Country? by Catherine Quantin, François-André Allaert, Paul Avillach, Maniane Fassa, Benoît Riandey, Gilles Trouessin, Olivier Cohen

    Published 2008-01-01
    “…We propose a method utilizing a derived social security number with the same reliability as the social security number. …”
    Get full text
    Article
  16. 1896

    Is the Financing of German Health and Long-Term Care Insurance Sustainable? by Friedrich Breyer, Normann Lorenz

    Published 2020-08-01
    “…Thus the sustainability of the German social security system is severely jeopardised.…”
    Get full text
    Article
  17. 1897

    Evaluasi Manajemen Keamanan Informasi Menggunakan Indeks Keamanan Informasi (KAMI) pada Jaringan (Studi Kasus: UIN Sunan Kalijaga Yogyakarta) by Rizki Dewantara, Bambang Sugiantoro

    Published 2021-11-01
    “…Abstract Attacks on networks today are very common, with more and more ways to access data and the development of technology used, they will certainly cause an increase in network security threats. Evaluation of information security management using the information security index (KAMI) conducted on the network at UIN Sunan Kalijaga Yogyakarta obtained an index result of 407, which is considered still not optimal. …”
    Get full text
    Article
  18. 1898
  19. 1899

    NIGERIA’S INTRACTABLE CRISIS OF NATIONAL INSECURITY AND THE RESPONSE OF THE SOUTHWESTERN STATES by Sunday Owen, ABANG PhD, ADEYEMI-SUENU, Adebowale(PhD)

    Published 2022-05-01
    “…This is in the face of the Nigeria Police Force found incapable to rise up to this national security challenge. To make up for this apparent insecurity, the South-west region instituted a regional security alternative Amoteku. …”
    Get full text
    Article
  20. 1900