Showing 1,881 - 1,900 results of 9,720 for search '"security"', query time: 0.08s Refine Results
  1. 1881

    A two-tier optimization strategy for feature selection in robust adversarial attack mitigation on internet of things network security by Kashi Sai Prasad, P Udayakumar, E. Laxmi Lydia, Mohammed Altaf Ahmed, Mohamad Khairi Ishak, Faten Khalid Karim, Samih M. Mostafa

    Published 2025-01-01
    “…Abstract Adversarial attacks were commonly considered in computer vision (CV), but their effect on network security apps rests in the field of open investigation. …”
    Get full text
    Article
  2. 1882
  3. 1883

    Cost-Effective and Energy-Efficient Photonics-Based Frequency Hopping by Single Wavelength-Tunable Laser for Secure THz Communication by Naoto Masutomi, Shenghong Ye, Bo Li, Ryota Kaide, Ming Che, Yuya Mikami, Yuta Ueda, Kazutoshi Kato

    Published 2025-01-01
    “…A photomixing-based frequency-hopping spread spectrum (FHSS) system is effective for future secure terahertz (THz) wireless communications. Conventional photomixing systems are typically composed of two lasers, which result in an increased system size and power consumption. …”
    Get full text
    Article
  4. 1884

    Environmental Contribution to the Effectiveness of Food Security Policy Implementation as A Rehabilitation Effort for Stunting Treatment in Rokan Hilir Regency by Yuliani Febri, Sulistyani Andri, Yusrizal Firdaus

    Published 2025-01-01
    “…According to SDGs 2030, food security must have 3 principles, namely; Availability, Affordability; and Benefits, hereinafter referred to as food security aspects. …”
    Get full text
    Article
  5. 1885

    Leveraging artificial intelligence and advanced food processing techniques for enhanced food safety, quality, and security: a comprehensive review by Sambandh Bhusan Dhal, Debashish Kar

    Published 2025-01-01
    “…Furthermore, AI addresses food security by enabling resource-efficient agriculture, yield forecasting, and supply chain optimization to ensure the availability and accessibility of nutritious food resources. …”
    Get full text
    Article
  6. 1886
  7. 1887
  8. 1888
  9. 1889

    Intersections of Middle East Crises and African Stability: Assessing the Impact of Regional Conflicts on Peace and Security in Sub-Saharan Africa by Abraham Ename Minko

    Published 2024-12-01
    “… This article examines regional crises and conflicts in the Middle East and Africa, assessing their impact on stability and security in a comparative perspective. It focuses on identifying common and specific elements in the structure of conflicts in the Middle East, such as the civil war in Syria and the Yemeni crisis, as they have far-reaching consequences beyond their immediate regions, significantly affecting the political, economic and security dynamics of sub-Saharan Africa. …”
    Get full text
    Article
  10. 1890
  11. 1891

    A Secure Application for Information Sharing i n Organizations: A Case Study of Kabale District Local Government by Ivan, Niyonzima, Godfrey, Omoda Onyait

    Published 2019
    Subjects: “…A secure Application; Information Sharing; organizations; Crypto-graphical Methods…”
    Get full text
    Article
  12. 1892
  13. 1893

    Legal bases for counteracting financial terrorism by I. V. Kyrieieva, А. І. Denysov

    Published 2021-09-01
    Subjects: “…economic security…”
    Get full text
    Article
  14. 1894
  15. 1895
  16. 1896

    Design of multi-key encryption method by Yuqing ZHONG, Hao WANG, Zebing LIN, Min WANG, Liye CHEN

    Published 2020-11-01
    Subjects: “…information security…”
    Get full text
    Article
  17. 1897
  18. 1898
  19. 1899
  20. 1900