Search Results - (severity OR security)

  1. Using AI to Identify National Security Threats: A Holistic Examination of the Legal Risks and Increased Need for Regulation

    Get full text
    Online Article RSS Article
  2. A Framework for Understanding Pastoralist-led Strategies to Secure Land and Resource Access: Case Studies from Kenya

    Published in Human Ecology (2025)
    Get full text
    Online Article RSS Article
  3. AI‐Powered Anomaly Detection for Secure Internet of Things (IoT): Optimising XGBoost and Deep Learning With Bayesian Optimisation

    Get full text
    Online Article RSS Article
  4. Police and civilians fractured relationship in the Northern Region of Ghana: A search for a common ground for internal security

    Get full text
    Online Article RSS Article
  5. Blockchain-enabled federated learning framework with hybrid CNN-LSTM anomaly detection for secure edge IoT networks

    Get full text
    Online Article RSS Article
  6. HELO Cryptography: A Lightweight Cryptographic System for Enhancing IoT Security in P2P Data Transmission

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  7. Toward Space-Based Public Key Systems: Enabling Secure Space Communications through In-Orbit Trust Services

    Published in ArXiv cs.ET Recent Papers (2026)
    Get full text
    Online Article RSS Article
  8. AoI-Guided Client Selection for Robust and Timely Federated Intrusion Detection in Cloud-Edge Security Analytics

    Published in ArXiv cs.DL Recent Papers (2026)
    Get full text
    Online Article RSS Article
  9. A Secure and Interoperable Big Data Platform for AI-Driven Healthcare Solutions: Insights From the GATEKEEPER Project

    Published in IEEE Access (2026)
    Get full text
    Online Article RSS Article
  10. Relationship between Job engagement, security, training and employees workplace behaviour in selected industries in Ogun and Lagos states, Nigeria

    Published 2014
    Subjects: “…"Job engagement, job security, job training, workplace behaviour "…”
    Full Text Available
    Access Repository
    Article
  11. Teachers and students' perceptions of the adequacy of upper basic social studies curriculum as a tool for citizenship participation and national security

    Published 2016
    Subjects: “…National Security…”
    Full Text Available
    Access Repository
    Book
  12. A Supervised Intrusion Detection System Leveraging Machine Learning for Secure Smart Education in the Internet of Education (IoEd)

    Get full text
    Online Article RSS Article
  13. Steady-State Security Region Boundary Characterization in Power Systems With Limited Samples: A Geometry-Guided Hybrid Approach

    Published in IEEE Access (2026)
    Get full text
    Online Article RSS Article
  14. Impact of climate-smart agricultural technologies adoption on food security in the West African Sahel: evidence from Mali and Niger

    Published in Food Security (2026)
    Get full text
    Online Article RSS Article
  15. Urban water security in Constantine province Algeria under demographic growth, climate change and sustainable water management approaches

    Published in Discover Sustainability (2026)
    Get full text
    Online Article RSS Article
  16. Enhanced Modelling and Analysis of Cyber‐Physical System Security Against DoS Attacks Using Generalised Stochastic Petri Nets

    Get full text
    Online Article RSS Article
  17. PCBS: a privacy-preserving carbon trading framework for AI-empowered IoT with blockchain and secure multi-party computation

    Get full text
    Online Article RSS Article