Showing 1,041 - 1,060 results of 9,720 for search '"security"', query time: 0.09s Refine Results
  1. 1041

    Synchronization of chaotic optomechanical system with plasmonic cavity for secured quantum communication by Mulubirhan Dangish, Abebe Belay Gemta, Alemayehu Getahun Kumela, Umer Sherefedin, Ruth Birhanu

    Published 2025-01-01
    “…Our findings pave the way for enhanced coherence and reliability in secure quantum communication systems, thus contributing to the advancement of this rapidly evolving field.…”
    Get full text
    Article
  2. 1042
  3. 1043
  4. 1044
  5. 1045
  6. 1046

    A Secure Image Encryption Algorithm Based on Rubik's Cube Principle by Khaled Loukhaoukha, Jean-Yves Chouinard, Abdellah Berdai

    Published 2012-01-01
    “…These encryption algorithms typically use relatively small key spaces and thus offer limited security, especially if they are one-dimensional. In this paper, we proposed a novel image encryption algorithm based on Rubik's cube principle. …”
    Get full text
    Article
  7. 1047
  8. 1048
  9. 1049
  10. 1050
  11. 1051

    A distributed data secure transmission scheme in wireless sensor network by Wei Liang, Yin Huang, Jianbo Xu, Songyou Xie

    Published 2017-04-01
    “…Therefore, it is difficult to ensure security of broadcasting data transferred from a single wireless sensor node to base station. …”
    Get full text
    Article
  12. 1052
  13. 1053

    An Investigation into Information Security Managerial Practices in Selected Public Sector Organizations. by Ahimbisibwe, Benjamin K., Nabende, Peter, Musiimenta, Florence

    Published 2023
    “…The study aims to examine information security managerial practices in organisations. It was guided by three specific objectives: identification of information security practices critical to information assets management; establishment of implementation processes involved in the execution of structured information security governance; and evaluation of policies that influence information security best practices. …”
    Get full text
    Article
  14. 1054
  15. 1055

    Private Cloud Assistant Trust Model for P2P Secure Transactions by Wei Lin, Xianghan Zheng

    Published 2015-01-01
    “…Secure transactions among P2P peers are critical for system stability. …”
    Get full text
    Article
  16. 1056
  17. 1057

    Adaptive Security Solutions for NOMA Networks: The Role of DDPG and RIS-Equipped UAVs by Syed Zain Ul Abideen, Abdul Wahid, Mian Muhammad Kamal

    Published 2024-11-01
    Subjects: “…non-orthogonal multiple access, reconfigurable intelligent surface, unmanned aerial vehicles, deep reinforcement learning, deep deterministic policy gradient, physical layer security.…”
    Get full text
    Article
  18. 1058

    Improving Network Security: An Intelligent IDS with RNN-LSTM and Grey Wolf Optimization by murtadha ali

    Published 2024-12-01
    “…The architecture of this RNN-LSTM with GWO IDS provides capable and responsive intrusion detection, training on previous data to be able to detect new threats. Made for network security by combining deep learning and optimization, tests reached 99.5% accurate. …”
    Get full text
    Article
  19. 1059

    A Secure and Green Cognitive Routing Protocol for Wireless Ad-Hoc Networks by Muhammad Saqib Javed, Rana Abu Bakar

    Published 2024-01-01
    “…The COG Protocol offers green and secure routing based on cognitive elementary memory intelligence, making it highly suitable for energy-efficient and secure wireless ad hoc networks.…”
    Get full text
    Article
  20. 1060