Showing 1,801 - 1,820 results of 9,720 for search '"security"', query time: 0.10s Refine Results
  1. 1801
  2. 1802
  3. 1803

    A Novel Security Methodology for Smart Grids: A Case Study of Microcomputer-Based Encryption for PMU Devices by Metin Varan, Akif Akgul, Fatih Kurugollu, Ahmet Sansli, Kim Smith

    Published 2021-01-01
    “…In this study, a two-way secure communication methodology underpinned by a chaos-based encryption algorithm for PMU devices is proposed. …”
    Get full text
    Article
  4. 1804

    “An Endless Cycle of Worry and Hardship”: The Impact of COVID-19 on the Food Security of Somali Migrants and Refugees in Nairobi, Kenya by Zack Ahmed, Jonathan Crush, Bernard Owusu

    Published 2025-01-01
    “…Based on the results of a household survey and in-depth interviews with Somali migrants in Nairobi, Kenya in August 2022, this study documents the pandemic-related experience of these migrants in food access and consumption and assesses the overall impacts of COVID-19 on their food security. This study seeks to contribute to the emerging body of case study evidence that assesses the food security outcomes of the pandemic in vulnerable populations. …”
    Get full text
    Article
  5. 1805
  6. 1806
  7. 1807

    Method on Efficient Operation of Multiple Models for Vision-Based In-Flight Risky Behavior Recognition in UAM Safety and Security by Byeonghun Kim, Byeongjoon Noh, Kyowon Song

    Published 2024-01-01
    “…Recently, with the significant spread of technology in the field of computer vision, research has been conducted to manage passenger safety and security with vision-based approaches. Previous research predominantly focuses on single-task vision models, which limits their ability to comprehensively recognize various situations. …”
    Get full text
    Article
  8. 1808
  9. 1809

    Changing Diets, Varying Food Consumption Patterns, and Food Security among Recent Zimbabwean Migrants in Windhoek, Namibia by Godfrey Tawodzera

    Published 2025-01-01
    Subjects: “…migration, poverty, food security, dietary changes, food consumption patterns…”
    Get full text
    Article
  10. 1810

    Information Security and Artificial Intelligence–Assisted Diagnosis in an Internet of Medical Thing System (IoMTS) by Pi-Yun Chen, Yu-Cheng Cheng, Zi-Heng Zhong, Feng-Zhou Zhang, Neng-Sheng Pai, Chien-Ming Li, Chia-Hung Lin

    Published 2024-01-01
    “…Then, a machine learning - based model was employed to train the encryptor and decryptor for both biosignals and image infosecurity. After secure - data transmission, a case study is conducted for classifying medical images. …”
    Get full text
    Article
  11. 1811

    Criminological examination of law acts and their drafts in the system of measures to combat corruption crime in the security and defense sector of Ukraine by I. S. Polyakov

    Published 2024-12-01
    “…The article is devoted to the study of the essence, purpose of criminological examination of regulatory legal acts and their drafts as a tool for combating corruption crime in the security and defense sector of Ukraine. A narrow and broad understanding of the specified examination is proposed. …”
    Get full text
    Article
  12. 1812

    Secured DICOM medical image transition with optimized chaos method for encryption and customized deep learning model for watermarking by R. Abirami, C. Malathy

    Published 2025-04-01
    “…For healthcare professionals to view patient medical images, a secure online transmitting technique is essential. …”
    Get full text
    Article
  13. 1813
  14. 1814

    Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2X by Yinghui ZHANG, Jiale QIAN, Jin CAO, Dong ZHENG

    Published 2023-08-01
    “…Aiming at the efficiency issue of handover authentication for a large number of vehicles in the 5G-V2X scenario, a secure and efficient group handover authentication protocol based on trajectory prediction was proposed.Firstly, the effect of completing key agreement protocol in advance was achieved by predicting vehicle trajectories.Secondly, vehicles with mobility relevance were treated as the same group through user grouping algorithms, and then all vehicles within the group were batch verified using certificateless aggregation signature technology.In addition, to address the vulnerability of aggregated signature technology to DoS attacks, a binary search method was used to quickly locate malicious users and improve the efficiency of group handover authentication protocol.Finally, the security analysis of the protocol was conducted using the formal verification tool Scyther, and compared with the existing optimal protocol, the computational efficiency is improved by 30%.…”
    Get full text
    Article
  15. 1815
  16. 1816
  17. 1817
  18. 1818

    Exploring South Africa’s Foreign Policy Objectives in the Decolonisation of the Intergovernmental Organisations: The Case of the United Nations Security Council by Thoriso Ntlailane, Costa Hofisi

    Published 2024-10-01
    “…The United Nations (UN), which is the largest intergovernmental organization (INGO), has a structure mainly focused on global security which is the United Nations Security Council (UNSC). …”
    Get full text
    Article
  19. 1819

    Blockchain-Powered Secure and Scalable Threat Intelligence System With Graph Convolutional Autoencoder and Reinforcement Learning Feedback Loop by Mohamad Khayat, Ezedin Barka, Mohamed Adel Serhani, Farag Sallabi, Khaled Shuaib, Heba M. Khater

    Published 2025-01-01
    “…This paper proposes an approach that integrates secure blockchain technology with data preprocessing, deep learning, and reinforcement learning to enhance threat detection and response capabilities. …”
    Get full text
    Article
  20. 1820