Search Results - (severity OR security)

  1. Evaluation of Social Security Reform in Turkey: Underlying Rationales and Economic-Administrative Consequences

    Published in Istanbul Journal of Economics (2026)
    Get full text
    Online Article RSS Article
  2. DDPG Optimization for Hybrid RIS-Assisted Secure Multi-User-MISO Networks

    Get full text
    Online Article RSS Article
  3. Stealthy Shields: Adversarial DRL Intelligence for Securing EV Charging Communication Systems

    Get full text
    Online Article RSS Article
  4. Secure and Explainable Federated Learning for IoT Intrusion Detection: A Comprehensive Survey

    Get full text
    Online Article RSS Article
  5. Gender and International Trade Policy: Economic Nostalgia and the National Security Steel Tariffs

    Get full text
    Online Article RSS Article
  6. Review of Fluoride Removal Appropriate Technology for Securing Safe Drinking Water in Africa

    Get full text
    Online Article RSS Article
  7. Predicting people's priorities for reconciling food security and biodiversity conservation in Kasungu, Malawi

    Published in Conservation Science and Practice (2026)
    Get full text
    Online Article RSS Article
  8. Health Security Ideas of Major Political Groups and the US Military Government during the ...

    Published in Korean Journal of Medical History (2022)
    Get full text
    Online Article RSS Article
  9. Changes of Global Infectious Disease Governance in 2000s: Rise of Global Health Security and ...

    Published in Korean Journal of Medical History (2016)
    Get full text
    Online Article RSS Article
  10. Nutritional and Biofunctional Insights into Crab Proteins: Prospects for Food Security and Blue Economy

    Published in Aquatic Sciences and Engineering (2026)
    Get full text
    Online Article RSS Article
  11. Nexus of Food Security Versus Armed Conflict in the Context of Climate Change in Mali

    Get full text
    Online Article RSS Article
  12. An enhanced dynamic key scheduling scheme for PRESENT lightweight cryptography to secure IoT

    Get full text
    Online Article RSS Article
  13. Blockchain-driven distributed key management for strengthening Industrial Internet of Things security

    Published in Discover Internet of Things (2026)
    Get full text
    Online Article RSS Article
  14. Understanding local expert perceptions of climate security hotspots using participatory mapping

    Published in PLOS Climate (2026)
    Get full text
    Online Article RSS Article
  15. Optimal Communication Rate of Secure Aggregation over Ring Networks with Pairwise Keys

    Published in ArXiv cs.IT Recent Papers (2026)
    Get full text
    Online Article RSS Article
  16. Firmware Distribution as Attack Surface: A Security Study of ASIC Cryptocurrency Miners

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  17. SkCC: Portable and Secure Skill Compilation for Cross-Framework LLM Agents

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  18. OPTCHAIN: AN ADVANCED OPTIMIZATION METHOD FOR ENHANCING IOT DATA SECURITY VIA BLOCKCHAIN

    Published in Computer Science (2025)
    Get full text
    Online Article RSS Article
  19. An Automated Framework for Cybersecurity Policy Compliance Assessment Against Security Control Standards

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  20. SERA: Secure Micro XRCE-DDS Establishment With Remote Attestation for Micro-ROS

    Published in IEEE Access (2026)
    Get full text
    Online Article RSS Article