Results 21 to 30 of about 251,419 (115)
Objective. The article examines the influence of the “man-machine-environment” system on the reliability of automated systems of internal affairs bodies of the Russian Federation.Method.
A. I. Yangirov +4 more
doaj +1 more source
A reconfigurable physical unclonable function is developed using CMOS‐integrated SOT‐MRAM chips, leveraging a dual‐pulse strategy and offering enhanced environmental robustness. A temperature‐compensation effect arising from the CMOS transistor and SOT‐MTJ is revealed and established as a key prerequisite for thermal resilience.
Min Wang +7 more
wiley +1 more source
The Global Risks Report 2016, 11th Edition [PDF]
Now in its 11th edition, The Global Risks Report 2016 draws attention to ways that global risks could evolve and interact in the next decade. The year 2016 marks a forceful departure from past findings, as the risks about which the Report has been ...
core
Towards Security Goals in Summative E-Assessment Security
The general security goals of a computer system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats.
Apampa, K.M, Argles, D, Wills, G.B
core +1 more source
Case Study On Social Engineering Techniques for Persuasion [PDF]
There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other malicious activities. If we know the basic working principal of such malware then we can very easily prevent most of them even ...
Hasan, Mosin +2 more
core +3 more sources
Beyond the Ban—Shedding Light on Smallholders' Price Vulnerability in Indonesia's Palm Oil Industry
ABSTRACT The Indonesian government imposed a palm oil export ban in April 2022 to address rising cooking oil prices. This study explores oil palm smallholders' vulnerability to the policy using descriptive statistics, Lasso, and post‐Lasso OLS regressions.
Charlotte‐Elena Reich +3 more
wiley +1 more source
Perceived risk and sensitive data on mobile devices [PDF]
This paper reports on a survey to investigate the behaviour and assumptions of smartphone users, with reference to the security practices adopted by such users.
Lazou, A., Weir, George
core
ABSTRACT Contract farming is a viable strategy agribusinesses rely on to strengthen coordination across actors in the value chain. However, low contract compliance remains a significant setback to agribusinesses' contract performance in low‐ and middle‐income country context.
Umar Shehu Umar +2 more
wiley +1 more source
Designing a Future Study Model: Examining Bank Employees’ Attitudes Towards Job Security in the Era of Blockchain Technology (Horizon 2031) [PDF]
Blockchain technology has emerged as a crucial factor impacting the banking sector. This study aimed to design and elucidate a future research model that explored bank employees’ attitudes towards job security in the context of blockchain technology by ...
Saeid Ghazi Nezhad +2 more
doaj +1 more source
Abstract This study investigates a fault‐tolerant control (FTC) approach for continuous stirred‐tank reactors (CSTR), emphasizing the importance of timely interventions to ensure operational safety under fault conditions. A systematic methodology combining residual‐based fault estimation and Dynamic Safety Margin (DSM) monitoring is developed to guide ...
Pu Du +3 more
wiley +1 more source

