Search Results - (severity OR security)

  1. Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

    Published in IET Networks (2022)
    Get full text
    Online Article RSS Article
  2. A Door Lock Security System with Remote Keyless Feature Using The Puf Approach Method

    Published in CHIPSET (2025)
    Get full text
    Online Article RSS Article
  3. The United States’ Strengthened National Security Review Of Chinese Investment: Implications From The Tech War

    Get full text
    Online Article RSS Article
  4. UN Security Council and Human Rights: An Inquiry into the Legal Foundations of the Responsibility to Protect in International Law

    Get full text
    Online Article RSS Article
  5. Speech Without Speakers: Eliminating Artificial Barriers to Pleading Corporate Scienter in Securities Fraud Claims

    Get full text
    Online Article RSS Article
  6. Unseen challenges to Arctic food security: the role of non-climatic factors in a changing climate

    Published in Regional Environmental Change (2026)
    Get full text
    Online Article RSS Article
  7. Impact of Social Media User Anxieties, Privacy and Security Issues, and Self-Regulation on User Behavior

    Published in Journal of Scientometric Research (2025)
    Get full text
    Online Article RSS Article
  8. The Effect of School Security Measures Implementation on Students’ Academic Performance in Selected Government Schools in China

    Get full text
    Online Article RSS Article
  9. Advancing Water Security and National Preparedness Through Earth Science Observations and the Earth Science Workforce

    Published in Earth and Space Science (2026)
    Get full text
    Online Article RSS Article
  10. Robust steganographic framework for securing sensitive healthcare data of telemedicine using convolutional neural network

    Get full text
    Online Article RSS Article
  11. Impact of in-Depth Adoption of System of Rice Intensification on Food Security of Smallholder Farm Households in Mali

    Get full text
    Online Article RSS Article
  12. CLAWING BACK FRAUDULENT PROFITS—INVESTOR PROTECTION OR REGULATORY OVERREACH: THE DISGORGEMENT DILEMMA IN SECURITIES LAW

    Get full text
    Online Article RSS Article
  13. Less is more: usefulness of data flow diagrams and large language models for security threat validation

    Published in EMSE (2026)
    Get full text
    Online Article RSS Article
  14. Secure and sustainable smart home networks with blockchain-based IoT framework for privacy and energy efficiency

    Published in Discover Internet of Things (2026)
    Get full text
    Online Article RSS Article
  15. On-farm adoption and impacts of climate-smart agricultural practices on food security of smallholder farmers in Mali

    Published in Food Security (2026)
    Get full text
    Online Article RSS Article
  16. Integrating Log-Based Security Analytics in Agile Workflows: A Real-World Experience Report

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  17. Can I Check What I Designed? Mapping Security Design DSLs to Code Analyzers

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  18. From Conceptual Scaffold to Prototype: A Standardized Zonal Architecture for Wi-Fi Security Training

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  19. Security Analysis of Time-of-Arrival Estimation via Cross-Correlation under Narrow-Band Conditions

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  20. Synergizing Policies and Farmers’ Willingness in Arable Land Protection for Food Security in East Java Indonesia

    Get full text
    Online Article RSS Article