Showing 8,381 - 8,400 results of 9,720 for search '"Securities ', query time: 0.10s Refine Results
  1. 8381

    Invisible Scout: A Layer 2 Anomaly System for Detecting Rogue Access Point (RAP) by Diki Arisandi, Nazrul M. Ahmad, Subarmaniam Kannan

    Published 2025-02-01
    “…Rogue Access Points (RAPs) pose a significant security threat by mimicking legitimate Wi-Fi networks and potentially compromising sensitive data. …”
    Get full text
    Article
  2. 8382

    Opportunities to use the EU countries experience in the field of preventive police activities in Ukraine by O. Yu. Prokopenko, D. O. Bulatin, R. O. Kushnirenko

    Published 2021-12-01
    “…Focusing on the European experience of preventive activity, the author emphasizes that there are three models of internal security in the European Union, and then reveals the content of each model. …”
    Get full text
    Article
  3. 8383

    Analysis of the influence factors of cultivated land transfer in Guangdong coastal important agricultural areas based on geodetectors by Zhaogang Fu, Zhaogang Fu, Qingyi Xue

    Published 2025-02-01
    “…IntroductionsAs a key link in the development of modern agriculture, the transfer of arable land is regarded as a strategic measure to improve agricultural production efficiency and ensure national food security. Although the transfer of arable land has been widely implemented nationwide, its specific impact on agricultural production and farmers’ income varies in different regions. …”
    Get full text
    Article
  4. 8384

    Climate change-driven shifts in the global distribution of tomato and potato crops and their associated bacterial pathogens by Muhammad Hubab, Niloufar Lorestani, Rogayah Akram Mheisin Al-Awabdeh, Farzin Shabani

    Published 2025-01-01
    “…Future efforts should focus on vulnerable areas to prevent significant economic losses and ensure food security.…”
    Get full text
    Article
  5. 8385

    Strategies for Mainstreaming Edible Cities with Focus on the City of Lincoln: A Critical Cross-Case Study Analysis of Community Growing Groups in the UK by Hannah Williams, Amira Elnokaly

    Published 2025-01-01
    “…This paper examines the role of edible city (EC) initiatives in addressing these challenges by enhancing food security, fostering social resilience and supporting community wellbeing. …”
    Get full text
    Article
  6. 8386
  7. 8387

    Folie a Deux: Shared Psychotic Disorder in a Medical Unit by Saumya Bhutani, Damir Huremovic

    Published 2021-01-01
    “…The patient was seen making statements that she needed security and the FBI to escort her as she left the hospital. …”
    Get full text
    Article
  8. 8388

    Sustainability Reporting and Assurance: A New Challenge for the Audit Profession in Europe by Darko DACHEVSKI, Barry ACKERS

    Published 2025-02-01
    “…Furthermore, the study advocates for the implementation of stringent regulations by national authorities to secure the market for sustainability reporting and assurance, aligning with previous scholarly calls for clearer regulatory frameworks in this sphere. …”
    Get full text
    Article
  9. 8389

    Comparison of breastfeeding self-efficacy between exclusive and non-exclusive breastfeeding in postpartum women by Parvaneh Sarparastrazmju

    Published 2024-08-01
    “…Methods: This descriptive comparative study was conducted on 228 women hospitalized in the Social Security Hospital of Zahedan who had given birth 24 hours earlier. …”
    Get full text
    Article
  10. 8390

    Future Studies of Tourism Development Planning (Case study: Ardabil province) by hossein nazmfar, ameneh alibakhshi

    Published 2021-12-01
    “…In the second step, using the Micmac method, 14 key Factors, including the comprehensive tourism plan, the media, stimulus policies, macro policies of the state, distribution of facilities, infrastructure, recreational centers, increased private incentive to invest in the region, the region's susceptibility to Investment in tourism, planning, security facilities, budget, the existence of hot and mineral water springs, improvement of information systems, such as site and blog, have been identified as key to the development of Ardebil province. …”
    Get full text
    Article
  11. 8391
  12. 8392

    «Healthy Personality» of a Modern University Student as a Research Concept by Zh. V. Puzanova, T. I. Larina

    Published 2022-07-01
    “…The authors propose the concept of a “healthy personality”, which includes the following components: emotional stability and psychological well-being, a low degree of suggestibility and adherence to the values of goodness and security. These components meet the challenges of the modern world and underlie the ability of a student’s personality to withstand the challenges of extremism. …”
    Get full text
    Article
  13. 8393

    CRIMEA AND THE POLITICS OF LEGITIMACY IN INTERNATIONAL RELATIONS by A. A. Vlasov, A. V. Brega

    Published 2018-05-01
    “…In addition, the issues of national security were an important circumstance of the Russian leadership actions during this period. …”
    Get full text
    Article
  14. 8394

    Encrypted and obfuscation WebShell detection for high-speed network traffic by Yihuai CAO, Wei CHEN, Fan ZHANG, Lifa WU

    Published 2022-08-01
    “…With the gradual development of traffic encryption and text obfuscation technologies, it is increasingly difficult to prevent complicated and malicious WebShell attack events in production environment using traditional detection methods based on text content and network flow features, especially for adversarial samples, variant samples and 0Day vulnerability samples.With the established network traffic collection environment, DPDK technology was used to capture network traffic in the high-speed network environment, and a dataset was marked with label.The dataset consisted of more than 24,000 normal traffic and more than 10,000 malicious WebShell traffic under different platforms, different languages, different tools, different encryption and obfuscation methods.Then Asynchronous traffic analysis system framework and lightweight log collection components were used to efficiently parse raw traffic.Expert knowledge was integrated to analyze HTTP data packets during the communication process of several popular WebShell management tools, and the effective feature set for encrypted and obfuscation WebShell was obtained.Support Vector Machine (SVM) algorithm was used to realize offline training and online detection of complicated WebShell malicious traffic based on the effective feature set.Meanwhile, improving the parameter search method with the genetic algorithm promoted the model training efficiency furthermore.The experimental results showed that the detection efficiency can be guaranteed based on the self-built WebShell attack traffic dataset.Besides, the detection model has a precision rate of 97.21% and a recall rate of 98.01%, and it performed well in the comparative experiments of adversarial WebShell attacks.It can be concluded from the results that the proposed method can significantly reduce the risk of WebShell attack, effectively supplement the existing security monitoring system, and be applied in real network environments.…”
    Get full text
    Article
  15. 8395

    Malicious code within model detection method based on model similarity by Degang WANG, Yi SUN, Chuanxin ZHOU, Qi GAO, Fan YANG

    Published 2023-08-01
    “…The privacy of user data in federated learning is mainly protected by exchanging model parameters instead of source data.However, federated learning still encounters many security challenges.Extensive research has been conducted to enhance model privacy and detect malicious model attacks.Nevertheless, the issue of risk-spreading through malicious code propagation during the frequent exchange of model data in the federated learning process has received limited attention.To address this issue, a method for detecting malicious code within models, based on model similarity, was proposed.By analyzing the iterative process of local and global models in federated learning, a model distance calculation method was introduced to quantify the similarity between models.Subsequently, the presence of a model carrying malicious code is detected based on the similarity between client models.Experimental results demonstrate the effectiveness of the proposed detection method.For a 178MB model containing 0.375MB embedded malicious code in a training set that is independent and identically distributed, the detection method achieves a true rate of 82.9% and a false positive rate of 1.8%.With 0.75MB of malicious code embedded in the model, the detection method achieves a true rate of 96.6% and a false positive rate of 0.38%.In the case of a non-independent and non-identically distributed training set, the accuracy of the detection method improves as the rate of malicious code embedding and the number of federated learning training rounds increase.Even when the malicious code is encrypted, the accuracy of the proposed detection method still achieves over 90%.In a multi-attacker scenario, the detection method maintains an accuracy of approximately 90% regardless of whether the number of attackers is known or unknown.…”
    Get full text
    Article
  16. 8396
  17. 8397
  18. 8398

    Ecologization of tourist activities as a factor of sustainable development of the regions of Ukraine by Hanna Haponenko, Denys Listratenko, Olena Yevtushenko, Irina Shamara

    Published 2023-12-01
    “…The purpose of the study is to build a model of sustainable development of regional tourism based on the ecosystem restoration of security of the tourist and recreational potential of Ukraine in the post-war period. …”
    Get full text
    Article
  19. 8399

    Deja vu: Medieval Motifs in Modern Arab Political Life by V. V. Naumkin, V. A. Kuznetsov

    Published 2019-09-01
    “…Finally, the third element discussed is the particular role of the army and other security forces in the Arab political systems.The authors provide three possible interpretations of all the revealed coincidences. …”
    Get full text
    Article
  20. 8400

    Autotransplantation of a Third Molar to Replace Compromised Molar With the Individual Three-Dimensional Printed Ultrasonic Osteotome: A Case Report by Cheng Bi, Wen Zhang, Bin Peng

    Published 2025-01-01
    “…Tooth #32 was then transplanted into the socket and secured with figure-eight suspension sutures. To prevent damage to bone cells and periodontal tissues from overheating during socket preparation, the ultrasonic osteotome was designed with a porous, water-cooled system, effectively addressing this issue. …”
    Get full text
    Article