Showing 1,061 - 1,080 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 1061

    A distributed data secure transmission scheme in wireless sensor network by Wei Liang, Yin Huang, Jianbo Xu, Songyou Xie

    Published 2017-04-01
    “…Therefore, it is difficult to ensure security of broadcasting data transferred from a single wireless sensor node to base station. …”
    Get full text
    Article
  2. 1062
  3. 1063

    An Investigation into Information Security Managerial Practices in Selected Public Sector Organizations. by Ahimbisibwe, Benjamin K., Nabende, Peter, Musiimenta, Florence

    Published 2023
    “…The study aims to examine information security managerial practices in organisations. It was guided by three specific objectives: identification of information security practices critical to information assets management; establishment of implementation processes involved in the execution of structured information security governance; and evaluation of policies that influence information security best practices. …”
    Get full text
    Article
  4. 1064

    THE SELECTION OF SMALL AND MEDIUM CAPITALIZATION ANALYSIS METHODS APPLIED IN INVESTOR PORTFOLIO FORMATION by A. Gulyatkin

    Published 2016-10-01
    Subjects: “…analysis securities of small and medium capitalization…”
    Get full text
    Article
  5. 1065
  6. 1066
  7. 1067

    Private Cloud Assistant Trust Model for P2P Secure Transactions by Wei Lin, Xianghan Zheng

    Published 2015-01-01
    “…Secure transactions among P2P peers are critical for system stability. …”
    Get full text
    Article
  8. 1068
  9. 1069

    Adaptive Security Solutions for NOMA Networks: The Role of DDPG and RIS-Equipped UAVs by Syed Zain Ul Abideen, Abdul Wahid, Mian Muhammad Kamal

    Published 2024-11-01
    Subjects: “…non-orthogonal multiple access, reconfigurable intelligent surface, unmanned aerial vehicles, deep reinforcement learning, deep deterministic policy gradient, physical layer security.…”
    Get full text
    Article
  10. 1070

    Improving Network Security: An Intelligent IDS with RNN-LSTM and Grey Wolf Optimization by murtadha ali

    Published 2024-12-01
    “…The architecture of this RNN-LSTM with GWO IDS provides capable and responsive intrusion detection, training on previous data to be able to detect new threats. Made for network security by combining deep learning and optimization, tests reached 99.5% accurate. …”
    Get full text
    Article
  11. 1071

    A Secure and Green Cognitive Routing Protocol for Wireless Ad-Hoc Networks by Muhammad Saqib Javed, Rana Abu Bakar

    Published 2024-01-01
    “…The COG Protocol offers green and secure routing based on cognitive elementary memory intelligence, making it highly suitable for energy-efficient and secure wireless ad hoc networks.…”
    Get full text
    Article
  12. 1072
  13. 1073

    Secure UAV-Based System to Detect Small Boats Using Neural Networks by Moisés Lodeiro-Santiago, Pino Caballero-Gil, Ricardo Aguasca-Colomo, Cándido Caballero-Gil

    Published 2019-01-01
    “…Given the high sensitivity of the managed information, the proposed system includes cryptographic protocols to protect the security of communications.…”
    Get full text
    Article
  14. 1074

    Research on consistency protection mechanism for secure states of virtual domain in cloud environment by Wei-qi DAI, De-qing ZOU, Hai JIN, Yan XIA

    Published 2016-10-01
    “…The traditional trusted computing architecture was suffering from the cloud uncertainty and dynamics caused by VM rollback or migration,which was a fatal threat to the cloud security.following investigations were conducted.Secure cloud virtual domain basic architecture; Time state consistence and collection mechanism.Cyber state consistence and collection mechanism.This study guaranteed security state consistence of virtual domain and improved the security and efficiency of the online service platform for both government institutions and companies.…”
    Get full text
    Article
  15. 1075
  16. 1076
  17. 1077

    New kind of CD-DCSK chaos shift keying secure communication system by Yong ZHU, Jia-nan WANG, Qun DING

    Published 2012-05-01
    “…As existing chaos keying communication systems had the issues of low data transmission rate and weak system confidentiality,a new kind of chaos shift keying communication system:CD-DCSK(correlation delay-differential chaos shift keying) was presented.At the same time lucubrated and simulated the communication performances of this new system.The theoretical deduction and emulational experimentation analysis verified that CD-DCSK has both merits of high confidentiality of CDSK and low BER of DCSK,and its transmission rate is twice as much as original shift keying schemes.Meanwhile,this new communication scheme perfectly achieved the secrecy transmission of age signal.Therefore,it can be clearly seen that this new system is realizable and has high security.…”
    Get full text
    Article
  18. 1078
  19. 1079

    Advanced Approach to Information Security Management System Model for Industrial Control System by Sanghyun Park, Kyungho Lee

    Published 2014-01-01
    “…Therefore, a new information security management system based on confidentiality, integrity, and availability as well as safety is required for ICSs. …”
    Get full text
    Article
  20. 1080