Showing 2,081 - 2,100 results of 9,720 for search '"security"', query time: 0.09s Refine Results
  1. 2081
  2. 2082
  3. 2083
  4. 2084

    Community Development in the Rural Areas through Traditional Indigenous Knowledge by Godfrey, Barigye, Siraje, Kaaya

    Published 2019
    Subjects: “…Community Development, Indigenous Knowledge, Peace and Security…”
    Get full text
    Article
  5. 2085
  6. 2086

    ‘We are not trained to do clinical work’: security staff providing physical restraint for NGT feeding in English paediatric wards—a qualitative multi-informant study by Dasha Nicholls, Jacinta Tan, Sarah Fuller, Emerie Sheridan

    Published 2024-12-01
    “…Objective To gain insights into the experience, and impact, of using security staff to facilitate physical restraints for nasogastric tube feeding.Design A cross-sectional design using 39 individual interviews, three online focus groups and three written submissions involving young people with lived experience (PWLE), parents/carers, paediatric staff and security staff involved in nasogastric feeding under restraint in paediatric settings in England. …”
    Get full text
    Article
  7. 2087
  8. 2088
  9. 2089
  10. 2090
  11. 2091
  12. 2092
  13. 2093
  14. 2094

    The situation in Afghanistan and its possible evolution in the context of the "factor 2014" by A. A. Orlov

    Published 2013-04-01
    Subjects: “…international security assistance force - isaf…”
    Get full text
    Article
  15. 2095
  16. 2096

    The Evaluative Process Model of Objectification: how men's evaluations of patriarchal security and women's fit with conventional beauty and sexuality norms interact to predict perpetration of sexually objectifying behaviors by Gemma Sáez, Abigail R. Riemer, Olivier Klein, Sarah J. Gervais

    Published 2025-01-01
    “…Among men who endorse patriarchal ideologies, perceived patriarchy threat or security is theorized to interact with evaluations of female targets to predict whether objectifying perceptions of female targets result in benevolent, derogative, or dismissive objectifying behaviors. …”
    Get full text
    Article
  17. 2097

    A Scalable Approach to Internet of Things and Industrial Internet of Things Security: Evaluating Adaptive Self-Adjusting Memory K-Nearest Neighbor for Zero-Day Attack Detection by Promise Ricardo Agbedanu, Shanchieh Jay Yang, Richard Musabe, Ignace Gatare, James Rwigema

    Published 2025-01-01
    “…This study confirms the feasibility of Adaptive SAMKNN as a real-time, scalable, and memory-efficient solution for IoT and IIoT security, providing reliable anomaly detection without overwhelming computational resources. …”
    Get full text
    Article
  18. 2098

    Research on Dual Security Control for a Non-Linear CPS with Multi-Objective Constraints under DoS Attack and Actuator Fault: An Active-Passive Attack-Tolerant Approach by Li Zhao, Wei Li, Yajie Li

    Published 2022-01-01
    “…Second, a non-linear CPS dual security control framework that integrates active-passive attack tolerance for DoS attack and active fault tolerance for actuator fault is constructed. …”
    Get full text
    Article
  19. 2099
  20. 2100