Search Results - (severity OR security)

  1. Maize Biodiversity and Food Security Status of Rural Households in the Derived Guinea Savannah of Oyo State, Nigeria

    Published 2016
    Full Text Available
    Access Repository
    Article
  2. Corrections to “Multi-Channel Multi-Protocol Quantum Key Distribution System for Secure Image Transmission in Healthcare”

    Published in IEEE Access (2026)
    Get full text
    Online Article RSS Article
  3. Adaptive Tangent Homomorphic Encryption with Equivariant Quantum Neural Networks for Secure Data Transmission Routing in MANET

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  4. Impact of Information Security Awareness Training on Knowledge, Attitude, and Behavior: A K-12 Case Study

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  5. Perceived income stability and financial security among gig workers in Indonesia: a socioeconomic and occupational analysis

    Published in Business: Theory and Practice (2026)
    Get full text
    Online Article RSS Article
  6. Improved Security in Multimedia Video Surveillance Using 2D Discrete Wavelet Transforms and Encryption Framework

    Published in Biophysics Reports (2019)
    Get full text
    Online Article RSS Article
  7. Book – F. Osler Hampson and M. Trotsky (Eds), Tug of War: Negotiating Security in Eurasia, 2017

    Published in Post-Soviet Armies Newsletter (2017)
    Get full text
    Online Article RSS Article
  8. Securing early-mover advantage in technology markets: Insights from the field on the contingent influence of organizational will and skill

    Published in AMS Review (2025)
    Get full text
    Online Article RSS Article
  9. Comparative Evaluation of Deep Learning Models, Security Tools, and Detection Frameworks for SQL Injection Attack Detection

    Published in Computer and Information Science (2026)
    Get full text
    Online Article RSS Article
  10. Comparative Analysis of Global Food Security Index Components with Population Growth: A Focus on Pakistan and China

    Published in Population and Economics (2025)
    Get full text
    Online Article RSS Article
  11. Machine Learning to Secure Wheels: A Survey of Misbehavior Detection for the Next-Generation of Connected and Autonomous Vehicles

    Get full text
    Online Article RSS Article
  12. The soil-root nexus: how soil health shapes plant nutrient uptake and food nutritional security

    Published in Plant and Soil (2026)
    Get full text
    Online Article RSS Article
  13. Race, Gender, and OrdinaryPeace: Assessing the Women, Peace, and Security Agenda through a Coloniality Lens

    Get full text
    Online Article RSS Article
  14. BAKE: a novel framework for iterative security design for identifying criminally-exploitable vulnerabilities in biotechnology products

    Published in Crime Science (2025)
    Get full text
    Online Article RSS Article
  15. Chance-constrained optimal power flow for improving line flow and voltage security of power transmission networks

    Published in Autonomous Intelligent Systems (2025)
    Get full text
    Online Article RSS Article
  16. A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

    Get full text
    Online Article RSS Article
  17. The Role of Minangkabau Culinary Heritage in Advancing Nutritional Security and SDG-2 Targets: A Macronutrient Perspective

    Get full text
    Online Article RSS Article