Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7501
Java deserialization gadget chain discovery method based on hybrid analysis
Published 2022-04-01“…Java deserialization vulnerabilities have become a common threat to Java application security nowadays.Finding out the gadget chain determines whether this type of vulnerability can be exploited.Due to the large code space of Java applications and dependent libraries and the polymorphism of Java itself, manual analysis of Java deserialization gadget chains consumes a lot of time and effort and it is highly dependent on the experienced knowledge.Therefore, it is crucial to study how to efficiently and accurately automate the discovery of gadget chains.Java deserialization gadget chain discovery method based on hybrid analysis was proposed.Call graph based on the variable declaration type was constructed, and then the deserialization entry functions that may reach the dangerous functions were screened using the call graph analysis.The screened entry functions were used as the entry point of the hybrid information flow analysis.The hybrid information flow analysis was carried out for both pointer and tainted variables.The tainted objects created implicitly were marked.The tainted information and the pointer information were propagated simultaneously to construct the hybrid information flow graph.The reachability of external taint data propagation to the dangerous function was judged based on the hybrid information flow graph.The corresponding deserialization gadget chain was constructed according to the taint propagation path.The hybrid analysis took into account the efficiency of call graph analysis and the accuracy of hybrid information flow analysis.The corresponding static analysis tool, namely GadgetSearch, was implemented based on the proposed hybrid analysis method.In the experimental evaluation, GadgetSearch had lower false positive and lower false negative than the existing tool GadgetInspector on four datasets of Ysoserial, Marshalsec, Jackson historical CVE, and XStream historical CVE.Additionally, GadgetSearch also found multiple undisclosed gadget chains.The experimental results show that the proposed method can efficiently and accurately discover the Java deserialization gadget chain in multiple practical Java applications.…”
Get full text
Article -
7502
A lung nodule segmentation model based on the transformer with multiple thresholds and coordinate attention
Published 2024-12-01Get full text
Article -
7503
Practical skills of psychology bachelors in working with automated HR platforms
Published 2024-12-01“…Particular attention should be paid to improving data security, which is becoming critical when working with HR platforms, as employees’ personal data needs to be protected from unauthorized access. …”
Get full text
Article -
7504
Analysis of the Energy Complex Member of the EАEU Countries and the Formation of Groups-Technologies of its Digitalization
Published 2023-04-01“…It is concluded that digitalization of the electric power system on the technical side increases the energy security of the state and the competitiveness of the energy system on the world market, and on the economic side it helps to reduce costs at all stages of the entire technological cycle.…”
Get full text
Article -
7505
Integrating AutoGluon for Real-Time Monitoring and Classification of Dental Equipment Performance
Published 2025-01-01Get full text
Article -
7506
Socio-Adaptive Dimension of Students’ Personal Space
Published 2019-05-01“….; however, only a few pieces of research practically view the modal content of students' spatial organization within the limits of their social and adaptive security. Therefore, it is essential to develop empirical programs for studying the modal features of students' personal space in a socio-adaptive dimension. …”
Article -
7507
Determining The Need for Fire Stations by Backup Double Covering Approach and Location Selection: The Case of Trabzon City
Published 2021-07-01“…Fire stations are emergency service units that serve for the security of lives and property in urban areas. It is critical for public safety to ensure the highest level of service ensuring a prompt response to the need. …”
Get full text
Article -
7508
Digital literacy model to improve the marketing skills of micro, small, and medium enterprises women with a community-based educational approach
Published 2024-07-01“…The main challenges faced are difficulties adapting to digital technology and concerns about digital security. Most respondents still rely on conventional marketing methods and feel less confident managing digital marketing campaigns. …”
Get full text
Article -
7509
-
7510
Determinants of Bank Competitiveness in Digital Era A Case Study of South Korea
Published 2019-08-01“…Furthermore, this study raises implications for policy makers to consider ICT security regulations in the banking market. This study contributes to the literatures by supporting the fact that the positive relationship between IT scandals and market share suggests implications to concentrated banking sectors and provides alarming with authority’s monitoring system.…”
Get full text
Article -
7511
Application and Thinking of Deep Learning in Predicting Lateral Cervical Lymph Node Metastasis of Papillary Thyroid Cancer
Published 2025-01-01“…With the establishment and sharing of large datasets, automated annotation, algorithm optimization, and resolution of data security issues, deep learning is expected to accurately predict lateral neck lymph node metastasis in PTC. …”
Get full text
Article -
7512
Employee Performance Evaluation Using A New Preferential Voting Process
Published 2020-11-01“…Twelve performance evaluation indicators extracted from the research background by experts in four categories with the titles of service compensation system in the first category; Job security, perceived organizational justice, perceived organizational support, and physical working conditions in the second category; Job characteristics, job clarity and ability of employees in the third category and job feedback, job stress, organizational citizen behaviour and motivation in the fourth category were ranked and documented using a linear optimization model based on the goal programming and policy. …”
Get full text
Article -
7513
Farmers and Agricultural Extension Officers Perception of Striga gesnerioides (Willd.) Vatke Parasitism on Cowpea in the Upper East Region of Ghana
Published 2018-01-01“…Walp] is an important food security crop in Sub-Saharan Africa. However, cowpea production in some parts of this region is constrained by Striga gesnerioides (Willd.) …”
Get full text
Article -
7514
Effects of infield rainwater harvesting methods and organic manure in improving soil chemical properties and maize production in low rainfall area of Zimbabwe
Published 2025-12-01“…It can be concluded that the use of IP + P integrated with cattle manure + compost improves maize yields in smallholder farming environments in semi-arid areas and achieves food security.…”
Get full text
Article -
7515
Limitation of the constitutional rights and freedoms of a person and a citizen in connection with the military aggression of the russian federation
Published 2024-06-01“…In the course of this study, an analysis of the application of restrictions on the constitutional rights and freedoms of a person and a citizen in connection with the military aggression of the russian federation, as well as the effect of these restrictions on the ordinary life of an ordinary Ukrainian, their effectiveness in relation to the security of the state as a whole, was carried out. …”
Get full text
Article -
7516
Youth and the pandemic: health information imaginaries and practices while navigating COVID-19 in Nigeria
Published 2025-01-01“…The pandemic’s impacts included mental health issues and economic hardship, particularly in a country lacking social security or welfare plans. Following a low vaccination rate among participants, the data revealed vaccine lethargy, “vaccinformation void,” vaccine misinformation, vaccine distrust, and vaccine inaccessibility, due to various reasons and factors at play. …”
Get full text
Article -
7517
Effective factors on variations of wheat production in climatic regions of Fars province
Published 2020-06-01“…Therefore, a deeper understanding of the impact of regional climate change on production ensures global food security. Wheat is one of the most strategic crops and examining different aspects of its production is a necessity of every agricultural community. …”
Get full text
Article -
7518
Next-generation neutron detection using a 6Li glass scintillator composite
Published 2025-01-01“…Abstract Neutron detectors are crucial in fundamental science, nuclear security, safeguards, and civil applications. 3He-filled gas proportional counters are the gold standard for thermal neutron detection, prized for their efficiency, neutron/gamma discrimination, and stability; however, the scarcity of 3He has prompted the search for alternatives. …”
Get full text
Article -
7519
Geography of Sand and Gravel Mining in the Lower Mekong River
Published 2013-12-01“…Currently, the most important issue in the Mekong basin is certainly the threat to the delta coastline because of its importance in terms of food security for the growing populations of Vietnam and Cambodia. …”
Get full text
Article -
7520
Geopolitics of Connectivity: The EU in Central Asia
Published 2024-12-01“…First, critical geopolitics will be operationalized with an emphasis on analytical categories such as discourse, hegemony, identity and ontological security. Thereafter, drawing upon the long-standing academic tradition of considering the EU as a geopolitical actor, the paper clarifies how, under the sway of the ongoing debate on strategic sovereignty (autonomy), the EU deploys the logic of inclusion and exclusion in its relations with third countries. …”
Get full text
Article