Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1661
Study of tactics and personal security measures of the dialogue police during the protection of public order at mass events
Published 2022-12-01Subjects: Get full text
Article -
1662
The Short Stint of a Coordinator: National Security Adviser H. R. McMaster in the Trump Administration
Published 2021-07-01Subjects: Get full text
Article -
1663
Secure relay node selection method based on Q-learning for fog computing in 5G network
Published 2019-07-01Subjects: Get full text
Article -
1664
RETRACTED: Security indicators and standards for microprocessor centralization in “2x2” and “1x1” systems
Published 2024-01-01Get full text
Article -
1665
Exploring Text Mining and Analytics for Applications in Public Security: an in-depth dive into a systematic literature review
Published 2023-07-01Subjects: Get full text
Article -
1666
Singapore Government Securitization Measures against Transboundary Haze Pollution as a Non-Traditional Security Threat
Published 2025-01-01“…It can be inferred that the government possesses complete authority to secure the smog issue. The community's response is critical in determining the success of haze securitization. …”
Get full text
Article -
1667
Quantum secure patient login credential system using blockchain for electronic health record sharing framework
Published 2025-02-01“…This study proposes a secure Patient Login Credential System (PLCS) for EHRS. …”
Get full text
Article -
1668
Intelligent Beam-Hopping-Based Grant-Free Random Access in Secure IoT-Oriented Satellite Networks
Published 2025-01-01“…This research presents an intelligent beam-hopping-based grant-free random access (GFRA) architecture designed for secure Internet of Things (IoT) communications in Low Earth Orbit (LEO) satellite networks. …”
Get full text
Article -
1669
Using the five-factor questionnaire to study the personality of a specialist-cynologist of the security agencies of the Russian Federation
Published 2024-11-01Subjects: Get full text
Article -
1670
Directions of the territory’s investment security mechanisms improvement in the context of digital transformation: Krasnodar Krai case study
Published 2023-03-01Subjects: “…investment security…”
Get full text
Article -
1671
Determinants of food security indicators in Bahir Dar City, Ethiopia: a focus on female-headed households
Published 2025-01-01“…This study aims to identify the determinants of food security among female-headed households across three sub-cities and six kebele administrations in Bahir Dar. …”
Get full text
Article -
1672
-
1673
Towards Secure Internet of Things: A Coercion-Resistant Attribute-Based Encryption Scheme with Policy Revocation
Published 2025-01-01“…Moreover, the scheme employs attribute-based encryption to secure IoT data, enabling fine-grained access control and dynamic user access management, providing a secure and flexible solution for vast IoT data. …”
Get full text
Article -
1674
ESTABLISHING THE FINANCIAL FOUNDATION OF THE CREDIT SECTOR IN THE FAR NORTH REGIONS WITHIN THE FRAMEWORK OF REGIONAL FINANCIAL SECURITY
Published 2024-12-01Subjects:Article -
1675
Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks
Published 2021-01-01“…First, we analyze the security threats faced by industrial controllable load, civil controllable load, and the gains and losses of attacks on the distribution networks. …”
Get full text
Article -
1676
Autonomous security analysis and penetration testing model based on attack graph and deep Q-learning network
Published 2023-12-01“…With the continuous development and widespread application of network technology, network security issues have become increasingly prominent.Penetration testing has emerged as an important method for assessing and enhancing network security.However, traditional manual penetration testing methods suffer from inefficiency,human error, and tester skills, leading to high uncertainty and poor evaluation results.To address these challenges, an autonomous security analysis and penetration testing framework called ASAPT was proposed, based on attack graphs and deep Q-learning networks (DQN).The ASAPT framework was consisted of two main components:training data construction and model training.In the training data construction phase, attack graphs were utilized to model the threats in the target network by representing vulnerabilities and possible attacker attack paths as nodes and edges.By integrating the common vulnerability scoring system (CVSS) vulnerability database, a “state-action”transition matrix was constructed, which depicted the attacker’s behavior and transition probabilities in different states.This matrix comprehensively captured the attacker’s capabilities and network security status.To reduce computational complexity, a depth-first search (DFS) algorithm was innovatively applied to simplify the transition matrix, identifying and preserving all attack paths that lead to the final goal for subsequent model training.In the model training phase, a deep reinforcement learning algorithm based on DQN was employed to determine the optimal attack path during penetration testing.The algorithm interacted continuously with the environment, updating the Q-value function to progressively optimize the selection of attack paths.Simulation results demonstrate that ASAPT achieves an accuracy of 84% in identifying the optimal path and exhibits fast convergence speed.Compared to traditional Q-learning, ASAPT demonstrates superior adaptability in dealing with large-scale network environments, which could provide guidance for practical penetration testing.…”
Get full text
Article -
1677
Women empowerment, efficiency and food security nexus in rural Ethiopia: A generalized structural equation modeling
Published 2025-01-01Subjects: Get full text
Article -
1678
Research on the security audit model in intrusion prevention based on write-related support vector data description
Published 2007-01-01Subjects: Get full text
Article -
1679
Research and design in dual network scheme of power corporation based on network isolation and secure data exchange
Published 2017-02-01Subjects: “…network and information security…”
Get full text
Article -
1680
A secure and robust color image watermarking method using SVD and GAT in the multiresolution DCHWT domain
Published 2023-11-01“…In this approach, the pre-processing phase employs successive generalized Arnold transforms to encrypt the RGB watermark layers, significantly enhancing the security of the watermarking algorithm. Subsequently, the blue layer of the host image undergoes R-level 2D-DCHWT processing. …”
Get full text
Article