Showing 1,381 - 1,400 results of 9,720 for search '"security"', query time: 0.10s Refine Results
  1. 1381
  2. 1382
  3. 1383

    Enhancing Intelligent Transport Systems Through Decentralized Security Frameworks in Vehicle-to-Everything Networks by Usman Tariq, Tariq Ahamed Ahanger

    Published 2025-01-01
    “…The result is a substantial advancement in securing vehicular networks.…”
    Get full text
    Article
  4. 1384
  5. 1385
  6. 1386
  7. 1387

    Providing a customer satisfaction model of non-attendance services in the social security organization by Hossein Barzgar, Vahid Sanavi Garoosiyan, ali hossein zadeh

    Published 2024-11-01
    “…AbstractThe purpose of this research is to provide a model of customer satisfaction with non-attendance services in the social security organization. The current research is applicable-developmental in terms of purpose; and descriptive-analytical based on the method. …”
    Get full text
    Article
  8. 1388

    Diegif: An efficient and secured DICOM to EGIF conversion framework for confidentiality in machine learning training by Abdullah Al Siam, Md Maruf Hassan, Md Atikur Rahaman, Masuk Abdullah

    Published 2025-03-01
    “…Medical imaging plays a critical role in contemporary healthcare, although it confronts issues relating to storage, security, and confidentiality in machine learning-based diagnostic systems. …”
    Get full text
    Article
  9. 1389
  10. 1390

    Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership by Yue CHEN, Chao-ling LI, Ju-long LAN, Kai-chun JIN, Zhong-hui WANG

    Published 2015-09-01
    “…To solve the difficult problems of sensitive data deduplication in cloud storage,such as detection and PoW (proofs of ownership) of the duplicated ciphertext,the attacks aiming at data sensitivity,etc,a Merkle hash tree based scheme called MHT-Dedup and a homomorphic MAC based scheme called hMAC-Dedup were proposed.Both schemes provided PoW of the ciphertext file to find duplicated files on cross-user file level and check the hash of block plaintext to find duplicated blocks on local block-level,which avoided the security flaws of the hash-as-a-proof method in the cross-user file-level client-side duplication detection.MHT-Dedup provided the deterministic PoW of file with an authen-ticating binary tree generated from the tags of encrypted blocks,which had lower computing and transferring cost,and hMAC-Dedup provided the probabilistic PoW of file by verifying some sampled blocks and their homomorphic MAC tags,which had lower additional storage cost.Analyses and comparisons show that proposed schemes are preferable in many as-pects such as supporting secure two-level client-side sensitive data deduplication and resisting to brute force attack to blocks.…”
    Get full text
    Article
  11. 1391
  12. 1392
  13. 1393
  14. 1394

    EdgeSecureDP: Strengthening IoHTs Differential Privacy Through Graphvariate Skellam by Mohamed Amjath, Shagufta Henna

    Published 2025-01-01
    “…These mechanisms treat data points independently, failing to account for the complex interconnections between nodes (drugs) and edges (interactions), leaves the network vulnerable to structural attacks that can reverse-engineer relationships, thus limiting the security of collaborative drug discovery. To address these limitations, this work proposes Graphvariate Skellam, a novel DP approach that leverages graph structure information in FL settings, referred to as EdgeSecureDP. …”
    Get full text
    Article
  15. 1395
  16. 1396

    Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions by Bilal Ahmad, Wang Jian, Zain Anwar Ali

    Published 2018-01-01
    “…Intrusion detection, an important entity towards network security, has the ability to observe network activity as well as detect intrusions/attacks. …”
    Get full text
    Article
  17. 1397

    IoT Security: Botnet Detection Using Self-Organizing Feature Map and Machine Learning by Susanto, Deris Stiawan, Budi Santoso, Alex Onesimus Sidabutar, M. Agus Syamsul Arifin, Mohd Yazid Idris, Rahmat Budiarto

    Published 2024-12-01
    “…Experimental results indicate that this approach is effective for enhancing IoT security in resource-constrained devices.…”
    Get full text
    Article
  18. 1398

    Security decision method for the edge of multi-layer satellite network based on reinforcement learning by Peiliang ZUO, Shaolong HOU, Chao GUO, Hua JIANG, Wenbo WANG

    Published 2022-06-01
    “…The simulation results show that compared with the random edge security decision and the edge security decision oriented by the signal-to-noise ratio parameter,the method proposed has a greater advantage in the delay performance, and is comparable to the optimal edge security decision performance obtained by traversal.The difference is small. …”
    Get full text
    Article
  19. 1399

    An Evaluation of the Security Ability of the Basic Endowment Insurance System for China’s Urban and Rural Residents by Bing Liu, Yuhong He, Zhi Liu

    Published 2022-01-01
    “…To evaluate security ability, a three-level evaluation index system with a total of 19 indicators is designed. …”
    Get full text
    Article
  20. 1400