Search Results - (severity OR security)

  1. Sentinel Mode Using Sensor Fusion for Improving Security in Shared Vehicles

    Published in IEEE Access (2026)
    Get full text
    Online Article RSS Article
  2. Cracking IoT security: can LLMs outsmart static analysis tools?

    Published in EMSE (2026)
    Get full text
    Online Article RSS Article
  3. Securing Fog-assisted IoT: An Adaptable and Efficient Threat Identification Approach

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  4. Türkiye's Energy Relations with Russia and the European Union in the context of Energy Security

    Get full text
    Online Article RSS Article
  5. Livelihood Diversification and Food Security among the Marginalized Waata Community in Ethiopia

    Get full text
    Online Article RSS Article
  6. Sustainable agricultural practices improve the food security of maize farmers in Ethiopia

    Published in Food Security (2026)
    Get full text
    Online Article RSS Article
  7. Unintended National Security Risks Tied to Healthcare Reform and the Cadillac Tax

    Get full text
    Online Article RSS Article
  8. Privacy and security in mobile technology: A bibliometric analysis for marketing strategies

    Published in Management & Marketing (2025)
    Get full text
    Online Article RSS Article
  9. Digital Transformation of Energy Systems: Technologies, Data, Governance and Cyber Security

    Published in IET Smart Grid (2026)
    Get full text
    Online Article RSS Article
  10. The National Security of Inbound & Outbound Investment: Reforming CFIUS and FOCI

    Get full text
    Online Article RSS Article
  11. The external debt overhang problem as a threat to global financial security

    Get full text
    Online Article RSS Article
  12. Decentralizing the Nigerian Police Force: A Plausible Approach to Hinterland Securities

    Get full text
    Online Article RSS Article
  13. Generating Proof-of-Vulnerability Tests to Help Enhance the Security of Complex Software

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  14. Securing the Agent: Vendor-Neutral, Multitenant Enterprise Retrieval and Tool Use

    Published in ArXiv cs.IR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  15. Hardware-Accelerated Line-Rate Bitstream Screening for Secure FPGA Reconfiguration

    Published in ArXiv cs.ET Recent Papers (2026)
    Get full text
    Online Article RSS Article
  16. Applying the Entitlement Approach to Understand Food Security Dynamics in South Africa

    Get full text
    Online Article RSS Article
  17. Understanding security challenges in the software supply chain through causal relationships

    Published in PLOS ONE (2026)
    Get full text
    Online Article RSS Article
  18. Multi-Perspective Security Risk Assessment for APT Attacks in CPS Environments

    Published in IEEE Access (2026)
    Get full text
    Online Article RSS Article
  19. Bayesian reanalysis of early remdesivir for the treatment of COVID-19 in outpatients with high risk of progression to severe disease

    Published in PLOS ONE (2026)
    Get full text
    Online Article RSS Article
  20. Human genetic ancestry, Mycobacterium tuberculosis diversity, and tuberculosis disease severity in Dar es Salaam, Tanzania

    Published in eLife (2026)
    Get full text
    Online Article RSS Article