Showing 1,361 - 1,380 results of 9,720 for search '"Securities ', query time: 0.13s Refine Results
  1. 1361
  2. 1362

    A Secure Privacy-Preserving Data Aggregation Model in Wearable Wireless Sensor Networks by Changlun Zhang, Chao Li, Jian Zhang

    Published 2015-01-01
    “…So, privacy preservation is becoming an increasingly important issue in security data aggregation. In this paper, we propose a security privacy-preserving data aggregation model, which adopts a mixed data aggregation structure. …”
    Get full text
    Article
  3. 1363
  4. 1364
  5. 1365
  6. 1366

    Strong incidence domination in some operations of fuzzy incidence graphs and application in security allocation by Kavya R. Nair, M. S. Sunitha

    Published 2024-12-01
    “…Additionally, the paper discusses an application of SID in security allocation.…”
    Get full text
    Article
  7. 1367
  8. 1368
  9. 1369

    BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid by Wei Ren, Jun Song, Min Lei, Yi Ren

    Published 2011-01-01
    “…BVS can achieve forward and backward security and only relies on hash functions. Security analysis justifies that the proposed schemes, especially BVS, can attain the security goals with low computation and storage cost.…”
    Get full text
    Article
  10. 1370

    Improved Population Intelligence Algorithm and BP Neural Network for Network Security Posture Prediction by Yueying Li, Feng Wu

    Published 2023-01-01
    “…To address the problems of low prediction accuracy and slow convergence of the network security posture prediction model, a population intelligence optimization algorithm is proposed to improve the network security posture prediction model of the BP neural network. …”
    Get full text
    Article
  11. 1371
  12. 1372
  13. 1373

    Traffic-related air pollutants (TRAP) in relation to respiratory symptoms among security guards by Muniandy Pravin, Abdul Aziz Nurhanim, Zainal Abidin Nur Balqishanis, Mohd Jamil Putri Anis, Ahnan Karthiga

    Published 2025-01-01
    “…Occupational lung disease is a significant health concern in Malaysia, which, relatively little research on respiratory issues among Malaysian security personnel. The objective of this study is to evaluate the exposure level of TRAP PM2.5 and respiratory symptoms among security guards. …”
    Get full text
    Article
  14. 1374
  15. 1375
  16. 1376
  17. 1377
  18. 1378

    Improve security monitoring knowledge management in IoT applications based on user behavior analysis by Hossein Amoozad-Khalili

    Published 2023-09-01
    “…Using the proposed method, users can transfer their data to IoT storage servers with more security than similar methods without knowing how and where to store it. …”
    Get full text
    Article
  19. 1379

    Secure Image Reconstruction using Deep Learning-based Autoencoder with Integrated Encryption Layers by Wurood Abd Ali

    Published 2024-12-01
    “… This study presents an autoencoder model designed for secure image reconstruction through the integration of encryption and decryption layers within its framework. …”
    Get full text
    Article
  20. 1380

    Federal Deep Learning Approach of Intrusion Detection System for In-Vehicle Communication Network Security by In-Seop Na, Anandakumar Haldorai, Nithesh Naik

    Published 2025-01-01
    “…CAN is susceptible to various network-level attacks due to the shortfall in security protocols. This article presents a new approach in addressing this challenge by introducing a unique intrusion detection system. …”
    Get full text
    Article