Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1281
Transport Systems Tracking and Inventory Security: A Case of Mega Bakery, Kabale.
Published 2025Subjects: Get full text
Thesis -
1282
Formation and development of special police units: a retrospective analysis
Published 2024-03-01Subjects: Get full text
Article -
1283
Empirical and methodological foundations on the impact of climate-smart agriculture on food security studies: Review
Published 2025-01-01Subjects: Get full text
Article -
1284
New time-frequency method of harmonic signal extraction in chaotic secure communication system
Published 2011-01-01Get full text
Article -
1285
Defending against social engineering attacks: A security pattern‐based analysis framework
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
1286
Secure and high throughput routing protocol with QoS constraints in cognitive wireless Mesh networks
Published 2014-11-01Subjects: Get full text
Article -
1287
Cyber security entity recognition method based on residual dilation convolution neural network
Published 2020-10-01“…In recent years,cybersecurity threats have increased,and data-driven security intelligence analysis has become a hot research topic in the field of cybersecurity.In particular,the artificial intelligence technology represented by the knowledge graph can provide support for complex cyberattack detection and unknown cyberattack detection in multi-source heterogeneous threat intelligence data.Cybersecurity entity recognition is the basis for the construction of threat intelligence knowledge graphs.The composition of security entities in open network text data is very complex,which makes traditional deep learning methods difficult to identify accurately.Based on the pre-training language model of BERT (pre-training of deep bidirectional transformers),a cybersecurity entity recognition model BERT-RDCNN-CRF based on residual dilation convolutional neural network and conditional random field was proposed.The BERT model was used to train the character-level feature vector representation.Combining the residual convolution and the dilation neural network model to effectively extract the important features of the security entity,and finally obtain the BIO annotation of each character through CRF.Experiments on the large-scale cybersecurity entity annotation dataset constructed show that the proposed method achieves better results than the LSTM-CRF model,the BiLSTM-CRF model and the traditional entity recognition model.…”
Get full text
Article -
1288
National, International and Legal Mechanisms of Control over the Activity of Non-Government Security Entities
Published 2019-06-01Subjects: Get full text
Article -
1289
Review of climate-resilient agriculture for ensuring food security: Sustainability opportunities and challenges of India
Published 2025-02-01Subjects: Get full text
Article -
1290
Multi-objective optimization placement strategy for SDN security controller considering Byzantine attributes
Published 2021-06-01Subjects: “…software defined network security…”
Get full text
Article -
1291
-
1292
Brain activity patterns reflecting security perceptions of female cyclists in virtual reality experiments
Published 2025-01-01“…Existing literature highlights that women’s willingness to use bicycles is significantly influenced by their perception of security. This study employs virtual reality (VR) cycling simulation and electroencephalography (EEG) analysis to investigate factors influencing female cyclists’ perceptions of security in Tehran. …”
Get full text
Article -
1293
CS-FL: Cross-Zone Secure Federated Learning with Blockchain and a Credibility Mechanism
Published 2024-12-01“…To address these challenges, this paper proposes a cross-zone secure federated learning method with blockchain and credibility mechanism, named CS-FL. …”
Get full text
Article -
1294
Adaptive Conflict-Free Optimization of Rule Sets for Network Security Packet Filtering Devices
Published 2015-01-01“…Packet filtering and processing rules management in firewalls and security gateways has become commonplace in increasingly complex networks. …”
Get full text
Article -
1295
Researcb on Network Security Monitoring Model and Associated Algoritbm in tbe Age of Big Data
Published 2014-07-01Subjects: Get full text
Article -
1296
Enhanced Image Security through 4D Hyperchaotic System and Hybrid Key Techniques
Published 2024-11-01“…This study develops a digital image encryption method using a 4D hyperchaotic system combined with a hybrid key to maximize data security. By generating a random and uniform pixel distribution, the method makes decryption significantly harder for unauthorized access. …”
Get full text
Article -
1297
An investigation of feature reduction, transferability, and generalization in AWID datasets for secure Wi-Fi networks.
Published 2025-01-01“…The practical implications of this research are crucial for the secure automation of wireless intrusion detection frameworks and tools in personal and enterprise paradigms.…”
Get full text
Article -
1298
Collaborative security assessment of cloud-edge-device distributed systems based on order parameters
Published 2024-06-01Subjects: Get full text
Article -
1299
R~2BAC:a risk-based multi-domain secure interoperation model
Published 2008-01-01Subjects: Get full text
Article -
1300
Secure hidden keyword searchable encryption schemewith fine-grained and flexible access control
Published 2013-08-01“…Moreover, the suggested system has the function to add and revoke user. Security analysis shows that the scheme could not only prevent the leakage of private data but also hide the information of keywords. …”
Get full text
Article