Search Results - (insecurity OR security)

  1. Chance-constrained optimal power flow for improving line flow and voltage security of power transmission networks

    Published in Autonomous Intelligent Systems (2025)
    Get full text
    Online Article RSS Article
  2. A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

    Get full text
    Online Article RSS Article
  3. The Role of Minangkabau Culinary Heritage in Advancing Nutritional Security and SDG-2 Targets: A Macronutrient Perspective

    Get full text
    Online Article RSS Article
  4. Does Farm Diversification Enhance Food and Livelihood Security? Evidence From Smallholder Cocoa Farmers in Ghana

    Published in Food and Energy Security (2026)
    Get full text
    Online Article RSS Article
  5. Focus Session: Autonomous Systems Dependability in the era of AI: Design Challenges in Safety, Security, Reliability and Certification

    Published in ArXiv cs.DC Recent Papers (2026)
    Get full text
    Online Article RSS Article
  6. Linux Kernel Runtime Guard Reaches 1.0: A Major Milestone for Runtime Kernel Security

    Published in Linux Journal (2026)
    Get full text
    Online Article RSS Article
  7. Knowledge, attitudes and practices of traceability among livestock traders in south-western Nigeria: implications for sustainable livestock industry

    Published 2013
    Subjects: “…Food security…”
    Full Text Available
    Access Repository
    Article
  8. Job security, job satisfaction and organizational commitment as correlates of job performance among workers in Lagos state, Nigeria

    Published 2012
    Full Text Available
    Access Repository
    Article
  9. Security and Privacy of Wearable and Implantable Medical Devices: A Course-Based Approach to Medical Device Cybersecurity Education

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  10. Interpretable Machine Learning‐Based Intelligent High‐Frequency Static Security Adjustment Method for Power System Operations

    Published in IET Smart Grid (2026)
    Get full text
    Online Article RSS Article
  11. DESIGN AND DEVELOPMENT OF A LOW-COST SMART HOME SECURITY SYSTEM USING ARDUINO MICROCONTROLLER AND GSM TECHNOLOGY

    Published in Acta Electronica Malaysia (2025)
    Get full text
    Online Article RSS Article
  12. IFSTA: A Fuzzy Clustering Scheme With Enhanced SFLA–TDO and DCNN–LSTM Security for Wireless Sensor Networks

    Published in IET Wireless Sensor Systems (2026)
    Get full text
    Online Article RSS Article
  13. Replacing Russian gas with that of the United States: A critical analysis from the European Union energy security perspective

    Published in Russian Journal of Economics (2022)
    Get full text
    Online Article RSS Article
  14. Using AI to Identify National Security Threats: A Holistic Examination of the Legal Risks and Increased Need for Regulation

    Get full text
    Online Article RSS Article
  15. A Framework for Understanding Pastoralist-led Strategies to Secure Land and Resource Access: Case Studies from Kenya

    Published in Human Ecology (2025)
    Get full text
    Online Article RSS Article
  16. AI‐Powered Anomaly Detection for Secure Internet of Things (IoT): Optimising XGBoost and Deep Learning With Bayesian Optimisation

    Get full text
    Online Article RSS Article
  17. Police and civilians fractured relationship in the Northern Region of Ghana: A search for a common ground for internal security

    Get full text
    Online Article RSS Article