Showing 1,901 - 1,920 results of 5,943 for search '"security"', query time: 0.06s Refine Results
  1. 1901

    Using Burstiness for Network Applications Classification by Hussein Oudah, Bogdan Ghita, Taimur Bakhshi, Abdulrahman Alruban, David J. Walker

    Published 2019-01-01
    “…Network traffic classification is a vital task for service operators, network engineers, and security specialists to manage network traffic, design networks, and detect threats. …”
    Get full text
    Article
  2. 1902
  3. 1903

    ILLEGAL TRANSNATIONAL MIGRATION AND ILLICIT DRUG TRAFFICKING IN NIGERIA by Aondowase Targba

    Published 2023-09-01
    “…There should be retraining, re-orientation and a clean-up strategy within the Nigerian security agencies to curb corruption in the security system. …”
    Get full text
    Article
  4. 1904

    Efficient Pairing-Free Privacy-Preserving Auditing Scheme for Cloud Storage in Distributed Sensor Networks by Xinpeng Zhang, Chunxiang Xu, Xiaojun Zhang

    Published 2015-07-01
    “…The previous research of distributed sensor network security has focused on secure information in communication; however the research of secure data storage has been overlooked. …”
    Get full text
    Article
  5. 1905

    Trusted Computing Strengthens Cloud Authentication by Eghbal Ghazizadeh, Mazdak Zamani, Jamalul-lail Ab Manan, Mojtaba Alizadeh

    Published 2014-01-01
    “…Companies encounter IAM as security challenges while adopting more technologies became apparent. …”
    Get full text
    Article
  6. 1906

    Effectiveness Evaluation of Random Forest, Naive Bayes, and Support Vector Machine Models for KDDCUP99 Anomaly Detection Based on K-means Clustering by Zhang Majun

    Published 2025-01-01
    “…Security in the World Wide Web has recently seen an enormous upgrade in almost every aspect. …”
    Get full text
    Article
  7. 1907

    Lightweight load-balanced and authentication scheme for a cluster-based wireless sensor network by Jiliang Zhou, Ziqiang Lin

    Published 2021-02-01
    “…Our research on relevant literature shows that the existing authentication schemes do not fully consider the load balancing of cluster heads, while the load balancing schemes ignore the security authentication of cluster heads. Therefore, this article effectively combines load balancing and security verification, and proposes a lightweight load balancing and verification scheme (secure load and energy balancing) based on clustered wireless sensor networks. …”
    Get full text
    Article
  8. 1908
  9. 1909

    Wireless Sensor Network Applications in Smart Grid: Recent Trends and Challenges by Yide Liu

    Published 2012-09-01
    “…However, the increased application of wireless sensor network also introduce new security challenges, especially related to privacy, connectivity, and security management, causing unpredicted expenditure and disaster to both utilities and consumers. …”
    Get full text
    Article
  10. 1910
  11. 1911

    Health system financing fragmentation and maternal mortality transition in Mexico, 2000–2022 by Edson Serván-Mori, Carlos Pineda-Antúnez, Diego Cerecero-García, Laura Flamand, Alejandro Mohar-Betancourt, Christopher Millett, Thomas Hone, Rodrigo Moreno-Serra, Octavio Gómez-Dantés

    Published 2025-01-01
    “…Seven out of ten maternal deaths occurred in the population without social security from 2000 to 2018, then decreasing to six out of ten from 2020. …”
    Get full text
    Article
  12. 1912

    Les syndicats, les commissaires et le politique : (re)valorisations et conflits autour de la profession policière en Tunisie (2011-2022) by Audrey Pluta

    Published 2023-12-01
    “…After 14 January 2011, the socio-professional conditions of members of the security forces became increasingly public, but also led to an unprecedented mobilisation of Tunisian police officers. …”
    Get full text
    Article
  13. 1913
  14. 1914
  15. 1915

    Intrusion Detection Systems in Wireless Sensor Networks: A Review by Nabil Ali Alrajeh, S. Khan, Bilal Shams

    Published 2013-05-01
    “…Their distributed nature, multihop data forwarding, and open wireless medium are the factors that make WSNs highly vulnerable to security attacks at various levels. Intrusion Detection Systems (IDSs) can play an important role in detecting and preventing security attacks. …”
    Get full text
    Article
  16. 1916

    In Favor of Endowing the Energy and Climate Fund with Borrowing Powers by Steffen Murau, Jan-Erik Thie

    Published 2022-06-01
    “…Abstract Energy security and independence are the new imperatives following the war of aggression on Ukraine ordered by Vladimir Putin. …”
    Get full text
    Article
  17. 1917
  18. 1918

    دور تحلیلات البیانات الضخمة فى انترنت الأشیاء : دراسة تحلیلیة مقارنة by د. یارة ماهر قناوى

    Published 2020-04-01
    “…The study Aimed to Identify in a Relation Ship big data analytics in IOTapplications benefits big data in internet of things , and Show the most popularplatforms to big data and IOT such as : Kaa , Hadoop , MAPR , and study therequirements of big data analytics in IOT finally show challenges facing big datain IOT the study was approved on the comparative method and reached severalresults the most important of them , the main problems that you face big data inIOT security and privacy 97%The most important results of the study : Big data and the Internet of things are complementary to each other, andthis integration is achieved through data analysis platforms. One of the most common security problems in IoT applications with bigdata is data center security, access control, redundant data filtering. One of the standards of open source Internet of Things platforms isstandards of integration, security and confidentiality, protocols,visualization support, databases. One of the most used big data analytics platforms is Hadoop, with apercentage of 90%, followed by Map R with 72.3%. …”
    Get full text
    Article
  19. 1919

    Decentralized identifiers based IoT data trusted collection by Baitao Zhang, Rui Shi, Xiaolin Li, Mengjiao Zhang

    Published 2025-02-01
    “…Abstract The data collection processes of IoT devices face significant security challenges, including access authorization, secure transmission, and secure storage. …”
    Get full text
    Article
  20. 1920