Showing 1,761 - 1,780 results of 16,832 for search '"Securities ', query time: 0.10s Refine Results
  1. 1761
  2. 1762
  3. 1763

    On the issue of psychodiagnosis of Internet addiction against the background of social isolation and security crisis by A. M. Stoliarenko, A. D. Horodokin

    Published 2023-09-01
    “…Aim: to analyze the diagnostic informativeness of the Kimberly Young’s Internet Addiction Test in the conditions of social isolation and security crisis in Ukraine. Materials and methods. …”
    Get full text
    Article
  4. 1764
  5. 1765
  6. 1766

    Implementation of the Elliptic Curve Cryptography Method in Digital Image Security in Medical Images by Yanuar Bhakti Wira Tama, syamsul mujahidin

    Published 2024-12-01
    “… Digital security become increasingly important particularly in medical field as impact of patient privacy and the protection of patient data. …”
    Get full text
    Article
  7. 1767

    A High Abstract Digital Forensic Readiness Metamodel for Securing Smart Cities by Gaseb Alotibi

    Published 2024-01-01
    “…As a solution to this challenge, the present study developed a high abstract digital forensic readiness metamodel (HADFRM) for securing smart cities using a model-driven engineering approach. …”
    Get full text
    Article
  8. 1768
  9. 1769
  10. 1770
  11. 1771
  12. 1772
  13. 1773
  14. 1774

    A Privacy-Preserving Secure Data Processing Scheme for the Internet of Medical Things by Ying Huang, Yongmei Su

    Published 2024-12-01
    “…This article introduces a secure data processing scheme for leveraging the IoMT application performance. …”
    Get full text
    Article
  15. 1775

    A network security situation prediction method based on hidden Markov model by Xiong ZHAN, Hao GUO, Peng ZHANG, Shu MAO

    Published 2015-12-01
    Subjects: “…network security situation prediction…”
    Get full text
    Article
  16. 1776
  17. 1777
  18. 1778
  19. 1779

    An Efficient Framework for Security of Internet-of-Things Devices against Malicious Software Updates by Anam Qureshi, Jawwad Shamsi, Murk Marvi

    Published 2024-01-01
    “…The intelligent broker includes a secure software engine that integrates a disassembler, a preprocessor, and predictive models to detect malicious software. …”
    Get full text
    Article
  20. 1780

    Secure and verifiable outsourcing of determinant computing in the cloud and its electronic trading scheme by Rui SUN, You-Liang TIAN

    Published 2016-11-01
    “…In view of the problem that users’ informations are leaked and tampered possiblely exists at service terminal in existing outsourcing cloud computing protocols,a secure efficient and verifiable outsourcing protocol about determinant computing in the cloud was proposed.Firstly,the outsourcing computing protocol was based on the fuzz matrix technology and needed not under the premise of any difficulty assumptions to ensure the security of users’ informations.Secondly,by means of generating a special kind of transformation matrixes to deal with plaintext matrix,then after the users receive the returned results,the correctness of these results can be verified effectively,and the performance analysis shows this protocol can effectively improve the efficiency of outsourcing cloud computing.Finally,an electronic trading framework for determinant outsourcing computing was proposed,which could be effectively applied to e-commerce and other fields.…”
    Get full text
    Article