Showing 1,641 - 1,660 results of 9,720 for search '"security"', query time: 0.07s Refine Results
  1. 1641

    End-Edge Collaborative Lightweight Secure Federated Learning for Anomaly Detection of Wireless Industrial Control Systems by Chi Xu, Xinyi Du, Lin Li, Xinchun Li, Haibin Yu

    Published 2024-01-01
    “…With the wide applications of industrial wireless network technologies, the industrial control system (ICS) is evolving from wired and centralized to wireless and distributed, during which eavesdropping and attacking become serious problems. To guarantee the security of wireless and distributed ICS, this article establishes an end-edge collaborative lightweight secure federated learning (LSFL) architecture and proposes an LSFL anomaly detection strategy. …”
    Get full text
    Article
  2. 1642

    A Blockchain-Assisted Federated Learning Framework for Secure and Self-Optimizing Digital Twins in Industrial IoT by Innocent Boakye Ababio, Jan Bieniek, Mohamed Rahouti, Thaier Hayajneh, Mohammed Aledhari, Dinesh C. Verma, Abdellah Chehri

    Published 2025-01-01
    “…Optimizing digital twins in the Industrial Internet of Things (IIoT) requires secure and adaptable AI models. The IIoT enables digital twins, virtual replicas of physical assets, to improve real-time decision-making, but challenges remain in trust, data security, and model accuracy. …”
    Get full text
    Article
  3. 1643
  4. 1644
  5. 1645

    Recent advancements in durable and self-healing oil well cement: A pathway to secure carbon sequestration by Yan Xie, Michelle Tiong, Qi Liu, Tong Wu, Wanzhen Xue, Chunkai Wang

    Published 2025-02-01
    “…The integrity of the cement sheath in storage wells is essential to secure the subsurface CO2 storage, however, acidic CO2 can erode the cement sheath over time, leading to chemical and mechanical damages of cement, risking CO2 leakage. …”
    Get full text
    Article
  6. 1646

    Efficient and secure attribute-based heterogeneous online/offline signcryption for body sensor networks based on blockchain by Jawaid Iqbal, Arif Iqbal Umar, Noorul Amin, Abdul Waheed

    Published 2019-09-01
    “…Moreover, hybrid blockchain provides advantages of interoperability, transparency traceability, and universal access. The formal security analysis of the proposed scheme is proved in the standard model, and informal security assures that our scheme provides resistance against possible attacks. …”
    Get full text
    Article
  7. 1647

    SYNERGY BETWEEN THE YOUTH AND A SECURED NATION: AN ATTEMPT TO DEVELOP NIGERIA THROUGH POLITICS AND ELECTORAL REMINISCENCE by ABDULKAREEM ONAKOYA

    Published 2024-05-01
    “…The study thereby recommends that; godliness, provision of employment opportunities by the government, secured borders, good parental care etc will improve on the security state of the nation. …”
    Get full text
    Article
  8. 1648

    Enhancing Secure Medical Data Communication Through Integration of LSB and DCT for Robust Analysis in Image Steganography by Ramyashree, P. S. Venugopala, S. Raghavendra, Vijay S. Kubihal

    Published 2025-01-01
    “…Steganography enhances data security by embedding information seamlessly within digital channels. …”
    Get full text
    Article
  9. 1649
  10. 1650

    2003 Handbook of Employment Regulations Affecting Florida Farm Employers and Workers: Social Security and Medicare [Federal] by Leo C. Polopolus, Michael T. Olexa, Fritz Roka, Carol Fountain

    Published 2003-07-01
    “… The purpose of Social Security and Medicare is to provide social benefits to qualified workers who retire, become disabled, and/or require medical assistance. …”
    Get full text
    Article
  11. 1651

    2003 Handbook of Employment Regulations Affecting Florida Farm Employers and Workers: Social Security and Medicare [Federal] by Leo C. Polopolus, Michael T. Olexa, Fritz Roka, Carol Fountain

    Published 2003-07-01
    “… The purpose of Social Security and Medicare is to provide social benefits to qualified workers who retire, become disabled, and/or require medical assistance. …”
    Get full text
    Article
  12. 1652
  13. 1653

    Cyber-Physical System Security for Manufacturing Industry 4.0 Using LSTM-CNN Parallel Orchestration by Salman Saeidlou, Nikdokht Ghadiminia, Kwadwo Oti-Sarpong

    Published 2025-01-01
    “…Its innovative concept, the distinctive mechanism of the PLO algorithm, and applying it in a simulated manufacturing industry make the proposed security system superior to comparable approaches.…”
    Get full text
    Article
  14. 1654
  15. 1655
  16. 1656
  17. 1657

    Designing the Interventions to Mitigate the Barriers of Coordination in Handling Food Security: Insight from Central Java Province by Aries Susanty, Novie Susanto, Hanifa Denny, Yulianto Prabowo, Regine A. S. Permadi, Ayu Fauziyah

    Published 2022-01-01
    “…This study aims to identify the underlying barriers that may prevent public policy coordination among stakeholders in dealing with food security in Central Java Province and suggest recommendations to enhance the coordination. …”
    Get full text
    Article
  18. 1658
  19. 1659

    Marilena Koppa. The Evolution of the Common Security and Defence Policy: Critical Junctures and the Quest for EU Strategic Autonomy by Ovidijus Pilitauskas

    Published 2024-04-01
    “…The Evolution of the Common Security and Defence Policy: Critical Junctures and the Quest for EU Strategic Autonomy. …”
    Get full text
    Article
  20. 1660

    Advancing hospital healthcare: achieving IoT-based secure health monitoring through multilayer machine learning by Ke Qi

    Published 2025-01-01
    “…Because of this, the conceptual IoT-based secure health monitoring system employs machine learning algorithms for enhanced accuracy. …”
    Get full text
    Article