Showing 1,241 - 1,260 results of 9,720 for search '"security"', query time: 0.07s Refine Results
  1. 1241
  2. 1242

    CYBER SECURITY ANALYSIS OF IOT DEVICES TRANSMITTING DATA IN THE THINGSPEAK PLATFORM CLOUD by DRAGOS-ALEXANDRU ANDRIOAIA

    Published 2022-10-01
    Subjects: “…IoT security, sniffing IoT attacks, ThingSpeak, IoT, IoT attacks…”
    Get full text
    Article
  3. 1243
  4. 1244

    A Secure and Robust Machine Learning Model for Intrusion Detection in Internet of Vehicles by Pradeep Kumar Tiwari, Shiv Prakash, Animesh Tripathi, Tiansheng Yang, Rajkumar Singh Rathore, Manish Aggarwal, Narendra Kumar Shukla

    Published 2025-01-01
    “…Although these technologies provide unparalleled connectivity and communication capabilities, they also introduce new security challenges, particularly in terms of Intrusion Detection. …”
    Get full text
    Article
  5. 1245
  6. 1246
  7. 1247
  8. 1248
  9. 1249
  10. 1250
  11. 1251

    Eucalyptus-based livelihoods: enhancing household food security and resilience in Northwest Ethiopia by Fasika Belay, Fasika Belay, Messay Mulugeta, Teferee Makonnen

    Published 2025-02-01
    “…Farmers in northwest Ethiopia have been transforming their livelihood strategies, however, the impact of this transformation on food security status and resilience is hardly investigated. …”
    Get full text
    Article
  12. 1252

    Monitoring Brazilian Food Security Based on Emergy Concepts: A Proposed Approach by Rafael Araujo Nacimento, Mario Duarte Canever, Luiz Carlos Terra dos Santos, Cecília Almeida, Feni Agostinho, Biagio Fernando Giannetti

    Published 2024-12-01
    “…This study enhances the discussion on food security by examining trade equity between food consumers and the supply chain from an emergy perspective. …”
    Get full text
    Article
  13. 1253

    Secure privacy-preserving record linkage system from re-identification attack. by Sejong Lee, Yushin Kim, Yongseok Kwon, Sunghyun Cho

    Published 2025-01-01
    “…Our method's efficacy was validated through simulations on the Titanic and North Carolina Voter Records (NCVR) datasets, demonstrating a substantial reduction in re-identification rates. Security analysis confirms that our zero-relationship encoding effectively preserves privacy against graph-based re-identification threats, improving PPRL technology's security.…”
    Get full text
    Article
  14. 1254
  15. 1255
  16. 1256
  17. 1257

    Production of Rice in Nigeria: The Role of Indian-Nigerian Bilateral Cooperation in Food Security by I. U. Lucky

    Published 2020-07-01
    “…The paper concludes that the agreements, particularly the one of 2017, have further promoted, strengthened and expanded rice production in the context of food security, job creation and saving foreign exchange. …”
    Get full text
    Article
  18. 1258
  19. 1259

    Adaptable Security in Wireless Sensor Networks by Using Reconfigurable ECC Hardware Coprocessors by J. Portilla, A. Otero, E. de la Torre, T. Riesgo, O. Stecklina, S. Peter, P. Langendörfer

    Published 2010-10-01
    “…Specific features of Wireless Sensor Networks (WSNs) like the open accessibility to nodes, or the easy observability of radio communications, lead to severe security challenges. The application of traditional security schemes on sensor nodes is limited due to the restricted computation capability, low-power availability, and the inherent low data rate. …”
    Get full text
    Article
  20. 1260