Search Results - (insecurity OR security)

  1. Police and civilians fractured relationship in the Northern Region of Ghana: A search for a common ground for internal security

    Get full text
    Online Article RSS Article
  2. Blockchain-enabled federated learning framework with hybrid CNN-LSTM anomaly detection for secure edge IoT networks

    Get full text
    Online Article RSS Article
  3. HELO Cryptography: A Lightweight Cryptographic System for Enhancing IoT Security in P2P Data Transmission

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  4. Toward Space-Based Public Key Systems: Enabling Secure Space Communications through In-Orbit Trust Services

    Published in ArXiv cs.ET Recent Papers (2026)
    Get full text
    Online Article RSS Article
  5. AoI-Guided Client Selection for Robust and Timely Federated Intrusion Detection in Cloud-Edge Security Analytics

    Published in ArXiv cs.DL Recent Papers (2026)
    Get full text
    Online Article RSS Article
  6. A Secure and Interoperable Big Data Platform for AI-Driven Healthcare Solutions: Insights From the GATEKEEPER Project

    Published in IEEE Access (2026)
    Get full text
    Online Article RSS Article
  7. Electoral violence and its implications on voters participation in the 2019 elections in Ogun State, Nigeria

    Published 2019
    Subjects: “…Security…”
    Full Text Available
    Access Repository
    Article
  8. Relationship between Job engagement, security, training and employees workplace behaviour in selected industries in Ogun and Lagos states, Nigeria

    Published 2014
    Subjects: “…"Job engagement, job security, job training, workplace behaviour "…”
    Full Text Available
    Access Repository
    Article
  9. Teachers and students' perceptions of the adequacy of upper basic social studies curriculum as a tool for citizenship participation and national security

    Published 2016
    Subjects: “…National Security…”
    Full Text Available
    Access Repository
    Book
  10. A Supervised Intrusion Detection System Leveraging Machine Learning for Secure Smart Education in the Internet of Education (IoEd)

    Get full text
    Online Article RSS Article
  11. Steady-State Security Region Boundary Characterization in Power Systems With Limited Samples: A Geometry-Guided Hybrid Approach

    Published in IEEE Access (2026)
    Get full text
    Online Article RSS Article
  12. Impact of climate-smart agricultural technologies adoption on food security in the West African Sahel: evidence from Mali and Niger

    Published in Food Security (2026)
    Get full text
    Online Article RSS Article
  13. Urban water security in Constantine province Algeria under demographic growth, climate change and sustainable water management approaches

    Published in Discover Sustainability (2026)
    Get full text
    Online Article RSS Article
  14. Enhanced Modelling and Analysis of Cyber‐Physical System Security Against DoS Attacks Using Generalised Stochastic Petri Nets

    Get full text
    Online Article RSS Article
  15. PCBS: a privacy-preserving carbon trading framework for AI-empowered IoT with blockchain and secure multi-party computation

    Get full text
    Online Article RSS Article
  16. Perspectives Regarding the Privacy, Security, and Confidentiality of Data Collected via mHealth Apps in Saudi Arabia: Qualitative Analysis

    Get full text
    Online Article RSS Article
  17. The differential impact of perceived job security on part‐time and full‐time entrepreneurial intention: A moderated mediation model

    Get full text
    Online Article RSS Article