Search

Your search keyword '"Security"' showing total 11,470 results

Search Constraints

Start Over You searched for: Descriptor "Security" Remove constraint Descriptor: "Security"
11,470 results on '"Security"'

Search Results

1. Al‐based energy aware parent selection mechanism to enhance security and energy efficiency for smart homes in Internet of Things.

2. Engaging with the Elusiveness of Violent Extremism in Norwegian Schools – The Promise and Potential of Agonistic Listening.

3. Incorporating quantum key distribution and reinforcement learning for secure and efficient smart grid advanced metering infrastructure.

4. Visual analytics for security threats detection in Ethereum consensus layer.

5. Globalising the 'war on terror'? An analysis of 36 countries.

6. Improved conceptualising of hybrid interference below the threshold of armed conflict.

7. Evolving security motifs, Olympic spectacle and urban planning legacy: from militarization to security-by-design.

8. Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network.

9. A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT).

10. Trustworthy machine learning in the context of security and privacy.

11. Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review.

12. Distributed hyperledger technology in FinTech with artificial intelligence assisted internet of things platform.

13. To Blend in or Hide Out? A Network Analysis on Maritime Criminal Co-voyages in Taiwan.

17. Innovation as erasure: Palestine and the new regional alliances of technology.

18. Saliency-Guided Sparse Low-Rank Tensor Approximation for Unsupervised Anomaly Detection of Hyperspectral Remote Sensing Images.

19. Accepting responsibility? Institutions and the security implications of climate change.

20. Blockchain-based optimized edge node selection and privacy preserved framework for federated learning.

21. Comparative analysis between a pixel-wise image encryption scheme and AES in a web application context.

22. Secure gene profile data processing using lightweight cryptography and blockchain.

23. Cybersecurity for autonomous vehicles against malware attacks in smart-cities.

24. A Confounding-Domain Randomized Approach for Providing Source Location Privacy Preservation for Wireless Sensor Networks.

25. CSO-DQN: Circle Search Optimization-based Deep Q-Learning Network for Intrusion Detection System in Cloud Environment.

26. The Trajectory of International and National Anti‐Terrorism Laws: An Appraisal of Counter‐terrorism Legislation in Kurdistan, Iraq.

27. Distinguishing between the “soldier” and the “brute”: engraving hierarchies of masculinity in conflict-related sexual violence discourse.

28. Model-based framework for exploiting sensors of IoT devices using a botnet: a case study with android.

29. A secure and transparent communication mechanism based on blockchain and fuzzy evaluation matrix in metaverse industry 4.0.

30. ResNet1D-Based Personal Identification with Multi-Session Surface Electromyography for Electronic Health Record Integration.

31. Tides of Blockchain in IoT Cybersecurity.

32. An Analysis of Blockchain-Based IoT Sensor Network Distributed Denial of Service Attacks.

33. Multi-level trust-based secure and optimal IoT-WSN routing for environmental monitoring applications.

34. Security challenges for workflow allocation model in cloud computing environment: a comprehensive survey, framework, taxonomy, open issues, and future directions.

35. 鸽 源 芽 孢 杆 菌 的 分 离 鉴 定 及 益 生 性 能 评 价.

36. Engaging women, peace, and security in defence: the role of the NATO committee on gender perspectives.

37. Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks.

38. A Survey on Security and Privacy Challenges in State-of-the-Art Microfluidic Biochips.

39. Unfolding the role of metaverse in agri‐food supply chain security: current scenario and future perspectives.

40. Comparative Analysis of Classification Methods and Suitable Datasets for Protocol Recognition in Operational Technologies.

41. تطور مفهوم الأمن في ضوء اجتهادات بهجت قرني: «نموذج الأمن الثقافي».

42. On guard but not sworn: The relationship between school security guards, school resource officers, and student behavior, discipline, and arrests.

43. Revisiting the maintenance of wakefulness test: from intra‐/inter‐scorer agreement to normative values in patients treated for obstructive sleep apnea.

44. Digitalization in the Renewable Energy Sector.

45. Chaos based Medical Image Encryption Techniques: A Comprehensive Review and Analysis.

46. Strategic narratives of Russia's war in Ukraine: perspectives from China.

49. KMS–AMI: an efficient and scalable key management scheme for secure two-way communications in advanced metering infrastructure of smart grid.

50. Security, Emotions and Radical Right Populism: Beyond a 'Flaunting of the Low'?

Catalog

Books, media, physical & digital resources