Showing 7,541 - 7,560 results of 9,720 for search '"security"', query time: 0.08s Refine Results
  1. 7541
  2. 7542

    Neural Networks Application for the Data of PID Controller for Acrobot by Nguyen Cong Danh

    Published 2022-01-01
    “…The purpose of this method is to increase the security of the system against the attack of hackers on facilities of the automatic control system. …”
    Get full text
    Article
  3. 7543

    The concept and significance of forensic characteristics of the unlawful seizure of enterprise, institution or organisation property by S. V. Stetsenko

    Published 2023-12-01
    “…This criminal offence causes economic losses to both business entities and the state as a whole, reduces the level of economic security and, as a result, the level of investment, discredits the work of government agencies, undermines the authority of the state at the international level, etc. …”
    Get full text
    Article
  4. 7544
  5. 7545

    Mediterranean refugee traffic: main routes and problems of control by Vasily D. Ostanin-Golovnya, Anna A. Pavliukova

    Published 2024-11-01
    “…The authors also cited forecasts from the European Union Agency for the Security of its External Borders for 2023–2024, which say that the pandemic and the economic crisis have affected migration flows, which will grow in the near future. …”
    Get full text
    Article
  6. 7546

    The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key by Ilham Firman Ashari, Eko Dwi Nugroho, Dodi Devrian Andrianto, M. Asyroful Nur Maulana Yusuf, Makruf Alkarkhi

    Published 2024-03-01
    “… Information security is paramount for individuals, companies, and governments. …”
    Get full text
    Article
  7. 7547

    Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing by Shang LIU, Yinzhang GUO

    Published 2022-06-01
    “…Proxy re-encryption allows a proxy to convert a ciphertext related to a certain access policy into another one with a different access policy without uncovering the underlying plaintext, which makes the proxy re-encryption technology to be an important technology for data sharing between users.However, the proxy re-encryption schemes are mostly based on single authority, which have some problems such as single power and performance bottleneck of the authority organization and high computing burden on user’s client.At the same time, most schemes do not have the five basic characteristics of proxy re-encryption: one-way encryption, non-interaction, repeatability, controllability and verifiability.In order to solve these problems, a CP-ABE proxy re-encryption scheme for cloud computing based on multi-authority with repeatability and controllability was proposed.Based on the ciphertext policy attribute encryption scheme, proxy servers of encryption and decryption were introduced to reduce the computing burden on the user’s client, and multi-attribute authorization were set to disperse the authority of the central authority.The proxy re-encryption was improved from multiple aspects.Random factors and ciphertext sub-item set in the re-encryption key can realize one-way encryption and controllability.The re-encryption key was independently generated by the client without the participation of servers, which can support users to share data when the data owner is not online.Encrypting the ciphertext sub-item set in the initial ciphertext many times can achieve repeatability.The verification sub-item set in the initial ciphertext allowed the user to verify whether the outsourcing and re-encryption results were correct.Compared with other schemes, the user’s client computing overhead of the proposed scheme was small, and the user can decrypt the original ciphertext only by performing constant times of exponential operation.Based on q-parallel BDHE assumption, the security analysis showed that the proposed scheme is secure against chosen-ciphertext attack (CCA) under the standard model.…”
    Get full text
    Article
  8. 7548

    The Azerbaijani Factor in the Clash of the Iranian and Turkish ‘Crescents’: A ‘Geopolitical New Moon’ in the South Caucasus by Mirmehdi M. Aghazada

    Published 2024-12-01
    “…The term ‘geopolitical new moon’ refers to the new geopolitical realities that emerged after the Second Karabakh War in the South Caucasus and have an impact on the regional security architecture, including the policies of Iran and Türkiye in this region. …”
    Get full text
    Article
  9. 7549

    A Fuzzy Multi-Criteria Approach for Selecting Open-Source ERP Systems in SMEs Using Fuzzy AHP and TOPSIS by Dana Marsetiya Utama, Muhammad Faisal Ibrahim, Ahmed Nedal Abid Al Kareem Jabari

    Published 2025-01-01
    “…System quality has been identified as a critical factor in the selection of an open-source ERP system, with particular emphasis on aspects such as security and reliability. These sub-criteria are considered the most influential in determining the suitability of a system. …”
    Get full text
    Article
  10. 7550
  11. 7551
  12. 7552

    Determinants of food insecurity among Syrian refugee women and their coping strategies by Kübra Esin, Feride Ayyıldız

    Published 2024-11-01
    “…Results It was found that 28% of the women who participated in the study had food security, 35% had mild, 24% had moderate, and 13% had severe food insecurity. …”
    Get full text
    Article
  13. 7553

    Blasting Vibration Generated by Breaking-Blasting Large Barriers with EBBLB by Wang Zhen-xiong, Gu Wen-bin, Liang Ting, Liu Jian-qing, Xu Jing-lin, Liu Xin

    Published 2016-01-01
    “…The study can predict ground vibration generated by EBBLB and assess its damaging effects of blasting vibration for security and protection.…”
    Get full text
    Article
  14. 7554

    Sistem Keamanan Multi Mail Server dengan Teknik Enkripsi OPENPGP pada Zimbra Exchange Open Source Software by Amrul Faruq, Khaeruddin Khaeruddin, Merinda Lestandy

    Published 2020-05-01
    “…The test results show that the OpenPGP  method works well for the security of the email sending/receiving system on a multi-mail server. …”
    Get full text
    Article
  15. 7555

    Universality of human rights: general theoretical characteristics by Yu. A. Kholod

    Published 2024-03-01
    “…In essence, human rights cover a wide range of aspects, such as the right to life, liberty and security of the person, freedom of thought and expression, the right to education, work and an adequate standard of living. …”
    Get full text
    Article
  16. 7556

    A novel numerical solution of nonlinear stochastic model for the propagation of malicious codes in Wireless Sensor Networks using a high order spectral collocation technique by Junjie Zhu, Misbah Ullah, Saif Ullah, Muhammad Bilal Riaz, Abdul Baseer Saqib, Atif M. Alamri, Salman A. AlQahtani

    Published 2025-01-01
    “…Abstract The open nature of Wireless Sensor Networks (WSNs) renders them an easy target to malicious code propagation, posing a significant and persistent threat to their security. Various mathematical models have been studied in recent literature for understanding the dynamics and control of the propagation of malicious codes in WSNs. …”
    Get full text
    Article
  17. 7557

    Effectiveness of Solution-oriented Group Counseling on Improving Job Burnout and Resilience of Working Women Referring to Counseling Centers in Bushehr City by Farzad Poorgholamy, Setareh Mohannaee, Nafisseh Shamoradi, Mitra Razavi Klishadi, Bamshad Eskandari

    Published 2023-12-01
    “…Furthermore, the experimental group demonstrated improvements in various aspects of resilience, such as competence, personal strength, trust in personal instincts, tolerance of negative emotions, positive acceptance of emotions, safe relationships, and control of security, compared to the control group. Conclusions: . …”
    Get full text
    Article
  18. 7558

    Prompt injection attacks on vision language models in oncology by Jan Clusmann, Dyke Ferber, Isabella C. Wiest, Carolin V. Schneider, Titus J. Brinker, Sebastian Foersch, Daniel Truhn, Jakob Nikolas Kather

    Published 2025-02-01
    “…However, here, we demonstrate that current VLMs applied to medical tasks exhibit a fundamental security flaw: they can be compromised by prompt injection attacks. …”
    Get full text
    Article
  19. 7559
  20. 7560

    Sustainability analysis of urban neighborhoods with emphasis on spatial and social justice Case Study: Maragheh City by Ali Movahed, Hasan Ahar, Ayub manouchehri, hadiseh gheysari, Abdolbaset Bozorgzadeh

    Published 2022-06-01
    “…Five key indicators (trust, partnership, engagement, membership and security) have been used to assess social capital. …”
    Get full text
    Article