Search Results - (severity OR security)

  1. The role of community policing in maintaining community safety and security in Addis Ababa City Administration

    Get full text
    Online Article RSS Article
  2. User, Admission and Discharge Characteristics at Secure Units in Residential Social Care Institutions in Slovenia

    Get full text
    Online Article RSS Article
  3. Food, climate, and the mind: Food (in)security and climate resilience as social determinants of mental health

    Published in PLOS Climate (2025)
    Get full text
    Online Article RSS Article
  4. Communication‐Security Co‐Design for Federated Learning in Grant‐Free NOMA IoT Networks

    Published in IET Communications (2026)
    Get full text
    Online Article RSS Article
  5. The Digital Radical: Online Extremism, Propagation, and Terror by Design's Strategic Implications for Homeland Security

    Published in Journal of Strategic Security (2026)
    Get full text
    Online Article RSS Article
  6. In Re FirstEnergy Corp. Securities Litigation: Where Macquarie Meets Affiliated Ute

    Get full text
    Online Article RSS Article
  7. Visualizing Precarity and Security: Mona Hatoum’s Drowning Sorrows and Guadalupe Maravilla’s Walk on Water

    Get full text
    Online Article RSS Article
  8. Post-Harvest Management of Fruits and Vegetables: Addressing Urban Nutrition and Food Security Challenges

    Published in Asian Journal of Crop Science (2026)
    Get full text
    Online Article RSS Article
  9. Green Proteins: A Sustainable Alternative to Animal‐Based Proteins for Global Protein Security

    Published in Food Frontiers (2026)
    Get full text
    Online Article RSS Article
  10. SecGoal: A Benchmark for Security Goal Extraction and Formalization from Protocol Documents

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  11. Self-Adaptive Multi-Agent LLM-Based Security Pattern Selection for IoT Systems

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  12. Analyzing Unsolicited Internet Traffic: Measuring IoT Security Threats via Network Telescopes

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  13. Secure Seed-Based Multi-bit Watermarking for Diffusion Models from First Principles

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  14. Heimdallr: Characterizing and Detecting LLM-Induced Security Risks in GitHub CI Workflows

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  15. MAGIQ: A Post-Quantum Multi-Agentic AI Governance System with Provable Security

    Published in ArXiv cs.MA Recent Papers (2026)
    Get full text
    Online Article RSS Article
  16. When the Ruler is Broken: Parsing-Induced Suppression in LLM-Based Security Log Evaluation

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  17. Democratizing Measurement of Critical Mobile Infrastructure: Security and Privacy in an Increasingly Centralized Communication Ecosystem

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  18. Legacy-Compatible Multi-User Wi-Fi Aggregation for Enhanced Downlink Efficiency and Security

    Published in IEEE Access (2026)
    Get full text
    Online Article RSS Article
  19. Harnessing ancient Vedic mathematics with Karatsuba multiplication for efficient and secure face recognition in surveillance

    Published in Discover AI (2026)
    Get full text
    Online Article RSS Article
  20. Sex and rank in public service hierarchies: Rank distribution in Ghana’s health and security services

    Published in PLOS ONE (2026)
    Get full text
    Online Article RSS Article