Search Results - (insecurity OR security)

  1. Arizona’s Experiential Learning Opportunities: Regional Security Operations Centers and Cybersecurity Clinics

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  2. Using Vibration for Secure Pairing With Implantable Medical Devices: Development and Usability Study

    Published in JMIR Biomedical Engineering (2025)
    Get full text
    Online Article RSS Article
  3. ECONOMIC AND POLITICAL PROBLEMS OF THE MIDDLE EAST COUNTRIES, SECURITY POLICIES OF THE REGIONAL STATES

    Get full text
    Online Article RSS Article
  4. Information System Security Policy Noncompliance: Effects of Sanctions and Training in Public Organizations

    Get full text
    Online Article RSS Article
  5. A Simulation-based Approach to Acquire Information Security Baseline of Network Device

    Published in Information Engineering (2013)
    Get full text
    Online Article RSS Article
  6. Hybrid Techniques for Shared File Security in Cloud Environment Using SHA-256

    Get full text
    Online Article RSS Article
  7. The Death of the X-XSS-Protection Header: A Web Security Post-Mortem

    Published in World Wide Web (2026)
    Get full text
    Online Article RSS Article
  8. Youth unemployment and its implications for peace and security in Ghana: A policy perspective

    Get full text
    Online Article RSS Article
  9. The security-development nexus in Ethiopia since 1991: The case of eastern Wallagga zone

    Get full text
    Online Article RSS Article
  10. Designed for Home: Opportunities for Enhanced Ontological Security in Permanent Supportive Housing Apartments

    Published in Journal of Interior Design (2022)
    Get full text
    Online Article RSS Article
  11. MINERAL NUTRIENT CONTENT OF BUCKWHEAT (FAGOPYRUM ESCULENTUM MOENCH) FOR NUTRITIONAL SECURITY IN NEPAL

    Get full text
    Online Article RSS Article
  12. Seeking Landed Security in (De)Industrialized Detroit and (Post)Colonial Mexican Ejidos

    Published in Critical Planning (2022)
    Get full text
    Online Article RSS Article
  13. A contingency-aware method for -2 security-constrained transmission expansion planning

    Get full text
    Online Article RSS Article
  14. AN INTEGRATED CAMPUS RADIO FREQUENCY IDENTIFICATION SYSTEM ON CLOUDS ANALYSIS FOR IMPROVED SECURITY

    Published in Acta Electronica Malaysia (2022)
    Get full text
    Online Article RSS Article
  15. Evaluation of Social Security Reform in Turkey: Underlying Rationales and Economic-Administrative Consequences

    Published in Istanbul Journal of Economics (2026)
    Get full text
    Online Article RSS Article
  16. DDPG Optimization for Hybrid RIS-Assisted Secure Multi-User-MISO Networks

    Get full text
    Online Article RSS Article
  17. Stealthy Shields: Adversarial DRL Intelligence for Securing EV Charging Communication Systems

    Get full text
    Online Article RSS Article
  18. Secure and Explainable Federated Learning for IoT Intrusion Detection: A Comprehensive Survey

    Get full text
    Online Article RSS Article
  19. Gender and International Trade Policy: Economic Nostalgia and the National Security Steel Tariffs

    Get full text
    Online Article RSS Article