Showing 1,361 - 1,380 results of 9,720 for search '"security"', query time: 0.07s Refine Results
  1. 1361

    Traffic-related air pollutants (TRAP) in relation to respiratory symptoms among security guards by Muniandy Pravin, Abdul Aziz Nurhanim, Zainal Abidin Nur Balqishanis, Mohd Jamil Putri Anis, Ahnan Karthiga

    Published 2025-01-01
    “…Occupational lung disease is a significant health concern in Malaysia, which, relatively little research on respiratory issues among Malaysian security personnel. The objective of this study is to evaluate the exposure level of TRAP PM2.5 and respiratory symptoms among security guards. …”
    Get full text
    Article
  2. 1362
  3. 1363
  4. 1364
  5. 1365
  6. 1366

    Improve security monitoring knowledge management in IoT applications based on user behavior analysis by Hossein Amoozad-Khalili

    Published 2023-09-01
    “…Using the proposed method, users can transfer their data to IoT storage servers with more security than similar methods without knowing how and where to store it. …”
    Get full text
    Article
  7. 1367

    Secure Image Reconstruction using Deep Learning-based Autoencoder with Integrated Encryption Layers by Wurood Abd Ali

    Published 2024-12-01
    “… This study presents an autoencoder model designed for secure image reconstruction through the integration of encryption and decryption layers within its framework. …”
    Get full text
    Article
  8. 1368

    Federal Deep Learning Approach of Intrusion Detection System for In-Vehicle Communication Network Security by In-Seop Na, Anandakumar Haldorai, Nithesh Naik

    Published 2025-01-01
    “…CAN is susceptible to various network-level attacks due to the shortfall in security protocols. This article presents a new approach in addressing this challenge by introducing a unique intrusion detection system. …”
    Get full text
    Article
  9. 1369

    The politics of gating (A response to Private Security and Public Space by Manzi and Smith-Bowers) by Rowland Atkinson

    Published 2008-05-01
    “…Critically then the risk is that ignoring the political and normative aspects of gating, as I believe Manzi and Smith-Bowers do, may lead to further and deeper socio-spatial segregation that itself excludes the voice of social groups least able to challenge or, indeed, reside in gated developments and the additional security that they appear to offer. …”
    Get full text
    Article
  10. 1370

    SOCIAL NETS AS A NEW FACTOR OF SYSTEM SECURITY IN RUSSIA IN THE 21ST CENTURY by S. A. Kravchenko, A. I. Podberezkin

    Published 2016-12-01
    “…The article analyzes the interconnection of social aspects of the Internet and security issues in Russia. It shows that contemporary realities acquire global network character that has ambivalent impact on the development of civilizational and social interactions. …”
    Get full text
    Article
  11. 1371

    Secured Wireless Network Based on a Novel Dual Integrated Neural Network Architecture by H. V. Ramachandra, Pundalik Chavan, S. Supreeth, H. C. Ramaprasad, K. Chatrapathy, G. Balaraju, S. Rohith, H. S. Mohan

    Published 2023-01-01
    “…Owing to the importance of their users, components, and services to our everyday lives, the network must secure all of these. With such a wide range of devices and service types being present in the 5G ecosystem, security issues are now much more prevalent. …”
    Get full text
    Article
  12. 1372

    Asymptotic Distribution of Isolated Nodes in Secure Wireless Sensor Networks under Transmission Constraints by Y. Tang, Q. L. Li

    Published 2016-01-01
    “…The Eschenauer-Gligor (EG) key predistribution is regarded as a typical approach to secure communication in wireless sensor networks (WSNs). …”
    Get full text
    Article
  13. 1373
  14. 1374

    Toward secure and accountable data transmission in Narrow Band Internet of Things based on blockchain by Hanshu Hong, Bing Hu, Zhixin Sun

    Published 2019-04-01
    “…While Narrow Band Internet of Things is gradually designed for commercial applications, it also confronts with several security concerns such as identification and privacy. …”
    Get full text
    Article
  15. 1375

    Security authentication protocol based on elliptic curve cryptography and cookie information for terminal of IoT by Jie ZHAO, Huarong ZHANG

    Published 2016-06-01
    “…For the security problem of terminal devices accessing to the network server in internet of things(IoT),an identity authentication protocol was presented based on elliptic curve cryptography(ECC)and cookie information for internet of things terminal.Firstly,the protocol used user identity information,server private key,random number and expiration time of cookie to form a cookie file.Then,it was encrypted with ECC and stored in the smart terminal.In authentication phase,the mutual authentication was achieved by comparing the security parameters calculated by cookie information.Performance analysis shows that it can resist many kinds of attacks and provide high security,low computation and low communication cost,which was suitable for the terminal devices of limited resources in internet of things.…”
    Get full text
    Article
  16. 1376
  17. 1377
  18. 1378

    Risk Prediction Algorithm of Social Security Fund Operation Based on RBF Neural Network by Linxuan Yang

    Published 2021-01-01
    “…In order to ensure the benign operation of the social security fund system, it is necessary to understand the social security fund facing all aspects of the risk, more importantly to know the relationship between different risks. …”
    Get full text
    Article
  19. 1379
  20. 1380