Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8381
Invisible Scout: A Layer 2 Anomaly System for Detecting Rogue Access Point (RAP)
Published 2025-02-01“…Rogue Access Points (RAPs) pose a significant security threat by mimicking legitimate Wi-Fi networks and potentially compromising sensitive data. …”
Get full text
Article -
8382
Opportunities to use the EU countries experience in the field of preventive police activities in Ukraine
Published 2021-12-01“…Focusing on the European experience of preventive activity, the author emphasizes that there are three models of internal security in the European Union, and then reveals the content of each model. …”
Get full text
Article -
8383
Analysis of the influence factors of cultivated land transfer in Guangdong coastal important agricultural areas based on geodetectors
Published 2025-02-01“…IntroductionsAs a key link in the development of modern agriculture, the transfer of arable land is regarded as a strategic measure to improve agricultural production efficiency and ensure national food security. Although the transfer of arable land has been widely implemented nationwide, its specific impact on agricultural production and farmers’ income varies in different regions. …”
Get full text
Article -
8384
Climate change-driven shifts in the global distribution of tomato and potato crops and their associated bacterial pathogens
Published 2025-01-01“…Future efforts should focus on vulnerable areas to prevent significant economic losses and ensure food security.…”
Get full text
Article -
8385
Strategies for Mainstreaming Edible Cities with Focus on the City of Lincoln: A Critical Cross-Case Study Analysis of Community Growing Groups in the UK
Published 2025-01-01“…This paper examines the role of edible city (EC) initiatives in addressing these challenges by enhancing food security, fostering social resilience and supporting community wellbeing. …”
Get full text
Article -
8386
Habenaria trichosantha Lindl.: A newly recorded orchid from China
Published 2024-12-01Get full text
Article -
8387
Folie a Deux: Shared Psychotic Disorder in a Medical Unit
Published 2021-01-01“…The patient was seen making statements that she needed security and the FBI to escort her as she left the hospital. …”
Get full text
Article -
8388
Sustainability Reporting and Assurance: A New Challenge for the Audit Profession in Europe
Published 2025-02-01“…Furthermore, the study advocates for the implementation of stringent regulations by national authorities to secure the market for sustainability reporting and assurance, aligning with previous scholarly calls for clearer regulatory frameworks in this sphere. …”
Get full text
Article -
8389
Comparison of breastfeeding self-efficacy between exclusive and non-exclusive breastfeeding in postpartum women
Published 2024-08-01“…Methods: This descriptive comparative study was conducted on 228 women hospitalized in the Social Security Hospital of Zahedan who had given birth 24 hours earlier. …”
Get full text
Article -
8390
Future Studies of Tourism Development Planning (Case study: Ardabil province)
Published 2021-12-01“…In the second step, using the Micmac method, 14 key Factors, including the comprehensive tourism plan, the media, stimulus policies, macro policies of the state, distribution of facilities, infrastructure, recreational centers, increased private incentive to invest in the region, the region's susceptibility to Investment in tourism, planning, security facilities, budget, the existence of hot and mineral water springs, improvement of information systems, such as site and blog, have been identified as key to the development of Ardebil province. …”
Get full text
Article -
8391
Enhanced testing can substantially improve defense against several types of respiratory virus pandemic
Published 2025-03-01Get full text
Article -
8392
«Healthy Personality» of a Modern University Student as a Research Concept
Published 2022-07-01“…The authors propose the concept of a “healthy personality”, which includes the following components: emotional stability and psychological well-being, a low degree of suggestibility and adherence to the values of goodness and security. These components meet the challenges of the modern world and underlie the ability of a student’s personality to withstand the challenges of extremism. …”
Get full text
Article -
8393
CRIMEA AND THE POLITICS OF LEGITIMACY IN INTERNATIONAL RELATIONS
Published 2018-05-01“…In addition, the issues of national security were an important circumstance of the Russian leadership actions during this period. …”
Get full text
Article -
8394
Encrypted and obfuscation WebShell detection for high-speed network traffic
Published 2022-08-01“…With the gradual development of traffic encryption and text obfuscation technologies, it is increasingly difficult to prevent complicated and malicious WebShell attack events in production environment using traditional detection methods based on text content and network flow features, especially for adversarial samples, variant samples and 0Day vulnerability samples.With the established network traffic collection environment, DPDK technology was used to capture network traffic in the high-speed network environment, and a dataset was marked with label.The dataset consisted of more than 24,000 normal traffic and more than 10,000 malicious WebShell traffic under different platforms, different languages, different tools, different encryption and obfuscation methods.Then Asynchronous traffic analysis system framework and lightweight log collection components were used to efficiently parse raw traffic.Expert knowledge was integrated to analyze HTTP data packets during the communication process of several popular WebShell management tools, and the effective feature set for encrypted and obfuscation WebShell was obtained.Support Vector Machine (SVM) algorithm was used to realize offline training and online detection of complicated WebShell malicious traffic based on the effective feature set.Meanwhile, improving the parameter search method with the genetic algorithm promoted the model training efficiency furthermore.The experimental results showed that the detection efficiency can be guaranteed based on the self-built WebShell attack traffic dataset.Besides, the detection model has a precision rate of 97.21% and a recall rate of 98.01%, and it performed well in the comparative experiments of adversarial WebShell attacks.It can be concluded from the results that the proposed method can significantly reduce the risk of WebShell attack, effectively supplement the existing security monitoring system, and be applied in real network environments.…”
Get full text
Article -
8395
Malicious code within model detection method based on model similarity
Published 2023-08-01“…The privacy of user data in federated learning is mainly protected by exchanging model parameters instead of source data.However, federated learning still encounters many security challenges.Extensive research has been conducted to enhance model privacy and detect malicious model attacks.Nevertheless, the issue of risk-spreading through malicious code propagation during the frequent exchange of model data in the federated learning process has received limited attention.To address this issue, a method for detecting malicious code within models, based on model similarity, was proposed.By analyzing the iterative process of local and global models in federated learning, a model distance calculation method was introduced to quantify the similarity between models.Subsequently, the presence of a model carrying malicious code is detected based on the similarity between client models.Experimental results demonstrate the effectiveness of the proposed detection method.For a 178MB model containing 0.375MB embedded malicious code in a training set that is independent and identically distributed, the detection method achieves a true rate of 82.9% and a false positive rate of 1.8%.With 0.75MB of malicious code embedded in the model, the detection method achieves a true rate of 96.6% and a false positive rate of 0.38%.In the case of a non-independent and non-identically distributed training set, the accuracy of the detection method improves as the rate of malicious code embedding and the number of federated learning training rounds increase.Even when the malicious code is encrypted, the accuracy of the proposed detection method still achieves over 90%.In a multi-attacker scenario, the detection method maintains an accuracy of approximately 90% regardless of whether the number of attackers is known or unknown.…”
Get full text
Article -
8396
Immobilization of fluorides from spent carbon cathode in a copper smelting slag
Published 2022-01-01Get full text
Article -
8397
-
8398
Ecologization of tourist activities as a factor of sustainable development of the regions of Ukraine
Published 2023-12-01“…The purpose of the study is to build a model of sustainable development of regional tourism based on the ecosystem restoration of security of the tourist and recreational potential of Ukraine in the post-war period. …”
Get full text
Article -
8399
Deja vu: Medieval Motifs in Modern Arab Political Life
Published 2019-09-01“…Finally, the third element discussed is the particular role of the army and other security forces in the Arab political systems.The authors provide three possible interpretations of all the revealed coincidences. …”
Get full text
Article -
8400
Autotransplantation of a Third Molar to Replace Compromised Molar With the Individual Three-Dimensional Printed Ultrasonic Osteotome: A Case Report
Published 2025-01-01“…Tooth #32 was then transplanted into the socket and secured with figure-eight suspension sutures. To prevent damage to bone cells and periodontal tissues from overheating during socket preparation, the ultrasonic osteotome was designed with a porous, water-cooled system, effectively addressing this issue. …”
Get full text
Article