Results 31 to 40 of about 5,759,507 (353)

The impact of foreign markets globalization on the price and functionality of electronic access control systems [PDF]

open access: yesSHS Web of Conferences, 2021
Research background: The research, which is the subject of the paper, is based on the global expansion of the use of electronic access control systems using biometric data for user verification.
Boroš Martin, Lenko Filip, Velas Andrej
doaj   +1 more source

Reclaiming the political : emancipation and critique in security studies [PDF]

open access: yes, 2012
The critical security studies literature has been marked by a shared commitment towards the politicization of security – that is, the analysis of its assumptions, implications and the practices through which it is (re)produced.
Alker H   +42 more
core   +1 more source

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead [PDF]

open access: yes, 2018
Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently.
Caire, Giuseppe   +5 more
core   +2 more sources

Bone metastatic carcinoma coexisting with plasma cell myeloma: a case report

open access: yesJournal of Medical Case Reports, 2022
Objective Multiple myeloma is a clonal plasma cell proliferation often causing bone lytic lesions. It is sometimes challenging to differentiate these lytic lesions associated with multiple myeloma from bone destruction due to a metastasis.
Marwa Aloui   +5 more
doaj   +1 more source

Detecting Unauthorized Movement of Radioactive Material Packages in Transport with an Adam-Optimized BP Neural Network Model

open access: yesScience and Technology of Nuclear Installations, 2023
The rapid expansion of nuclear technology across various sectors due to global economic growth has led to a substantial rise in the transportation of radioactive materials.
Panpan Jiang   +7 more
doaj   +1 more source

Securing By Design [PDF]

open access: yes, 2011
This article investigates how modern neo-liberal states are 'securing by design' harnessing design to new technologies in order to produce security, safety, and protection.
Adorno   +60 more
core   +1 more source

Particle Propagation Model for Dynamic Node Classification

open access: yesIEEE Access, 2020
With the popularity of online social networks, researches on dynamic node classification have received further attention. Dynamic node classification also helps the rapid popularization of online social networks.
Wenzheng Li   +4 more
doaj   +1 more source

Reve\{a,i\}ling the risks: a phenomenology of information security [PDF]

open access: yes, 2009
In information security research, perceived security usually has a negative meaning, when it is used in contrast to actual security. From a phenomenological perspective, however, perceived security is all we have.
Pieters, Wolter
core   +4 more sources

The SmartAG partner: CCAFS East Africa Bi-Annual Newsletter, July - December 2019 [PDF]

open access: yes, 2020
We are pleased to share with you our SmartAg Partner bi-annual newsletter, highlighting policy engagement, ongoing research, field updates and activities with partners from the second half of ...
CGIAR Research Program on Climate Change, Agriculture and Food Security
core  

Symbolic Quantitative Information Flow [PDF]

open access: yes, 2012
acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acmid: 2382791 issue_date: November 2012 keywords ...
Malacaria, P   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy