Showing 1,021 - 1,040 results of 9,720 for search '"security"', query time: 0.07s Refine Results
  1. 1021

    Risk assessment and prevention in airport security assurance by integrating LSTM algorithm. by Yao Hu, Liguang Qiao, Feng Gu

    Published 2025-01-01
    “…It monitored the airport security situation in real-time based on the results and quickly notified airport security personnel to handle it. …”
    Get full text
    Article
  2. 1022
  3. 1023
  4. 1024

    The role of digital health in pandemic preparedness and response: securing global health? by Chisom Ogochukwu Ezenwaji, Esther Ugo Alum, Okechukwu Paul-Chima Ugwu

    Published 2024-12-01
    “…Background Digital health technologies, such as mobile applications, wearable devices, and electronic health record systems, have significantly enhanced global health security by enabling timely data collection and analysis, identifying infectious disease trends, and reducing infection risk through remote services. …”
    Get full text
    Article
  5. 1025
  6. 1026
  7. 1027
  8. 1028
  9. 1029
  10. 1030

    Research on the security of national secret algorithm based compute first networking by Jie PAN, Lan YE, Pengfei ZHANG, Zhonggui BU

    Published 2023-08-01
    “…With the promotion of national secret algorithm, in-depth research on the arithmetic network was carried out, a more efficient and reasonable security scheme for the arithmetic network was proposed, ensuring the data security and privacy of the arithmetic network with the help of the state secret algorithm.The main elements of the design program included: Supporting arithmetic demand and cryptographic invocation through the underlying resources, the arithmetic orchestration layer provided the ability to orchestrate data arithmetic, meanwhile, the arithmetic scheduling layer intelligently discerned the optimal nodes for arithmetic resource scheduling and allocation; the cryptographic reinforcement layer used the national secret algorithm based on hardware support with the help of public key cryptosystem, hash function, digital envelope, homomorphic encryption, blockchain and other technologies.Focusing on arithmetic network access security, transmission security, data security and privacy protection aspects of security implementation.An architecture and application form was innovatively proposed to guarantee the data security of the arithmetic network, which could meet the needs of the application layer arithmetic in the scenarios of big data, intelligent technology, etc..The security of the arithmetic network is enhanced by empowering the arithmetic network through the state-secret algorithm.…”
    Get full text
    Article
  11. 1031

    Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review by Sufian Hameed, Faraz Idris Khan, Bilal Hameed

    Published 2019-01-01
    “…On the contrary, IoT has various security and privacy concerns for the end users that limit its proliferation. …”
    Get full text
    Article
  12. 1032
  13. 1033

    Access control security model based on behavior in cloud computing environment by Guo-yuan LIN, Shan HE, Hao HUANG, Ji-yi WU, Wei CHEN

    Published 2012-03-01
    “…In view of the current popular cloud computing technology,some security problems were analyzed.Based on BLP(Bell-LaPadula) model and Biba model,using the access control technology based on behavior to dynamic adjusting scope of subject's visit,it put forward the CCACSM ( cloud omputing access control security model).The model not only guarantees the cloud computing environment information privacy and integrity,and makes cloud computing environment with considerable flexibility and practical.At last,it gives the model's part,safety justice and realization process.…”
    Get full text
    Article
  14. 1034
  15. 1035
  16. 1036

    Predictive Policing and Enhancing Security Performance through Artificial Intelligence Applications by Bensalem Kheira

    Published 2024-12-01
    “…This paper stress the importance of leveraging predictive technologies to foster preparedness, resilience, and security in an increasingly interconnected world. By modernizing infrastructures and embracing AI-driven strategies, nations can navigate the complexities of the digital era effectively, paving the way for sustainable progress and global stability.…”
    Get full text
    Article
  17. 1037
  18. 1038
  19. 1039
  20. 1040

    Secure Pesticide Storage: Using and Managing a Pesticide Storage Facility by Thomas W. Dean

    Published 2004-10-01
    “…Revised: November 2004.  PI33/PI068: Secure Pesticide Storage: General Features (ufl.edu) …”
    Get full text
    Article