Search Results - (severity OR security)

  1. Perspectives Regarding the Privacy, Security, and Confidentiality of Data Collected via mHealth Apps in Saudi Arabia: Qualitative Analysis

    Get full text
    Online Article RSS Article
  2. The differential impact of perceived job security on part‐time and full‐time entrepreneurial intention: A moderated mediation model

    Get full text
    Online Article RSS Article
  3. Toward Autonomous SOC Operations: End-to-End LLM Framework for Threat Detection, Query Generation, and Resolution in Security Operations

    Published in ArXiv cs.IR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  4. Security Attack and Defense Strategies for Autonomous Agent Frameworks: A Layered Review with OpenClaw as a Case Study

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  5. When RAG Chatbots Expose Their Backend: An Anonymized Case Study of Privacy and Security Risks in Patient-Facing Medical AI

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  6. Multi-Level Secure Image Cryptosystem Using Logistic Map Chaos: Entropy, Correlation, and 3D Histogram Validation

    Published in Jurnal Masyarakat Informatika (2025)
    Get full text
    Online Article RSS Article
  7. Syndrome-Based Multi-Bit Error Correction With Chaotic Secure Check-Sequence Sharing for Quantum Key Distribution Systems

    Published in IEEE Access (2026)
    Get full text
    Online Article RSS Article
  8. A fully decentralized federated adversarial vision transformer with blockchain and secure aggregation for visual-based intrusion and malware forensics

    Published in JDSA (2026)
    Get full text
    Online Article RSS Article
  9. Multi-Agent Reinforcement Learning for Scalable Multi-Objective Secure and Economic Operation of Flexible Distribution Networks With Congestion Mitigation

    Published in IEEE Access (2026)
    Get full text
    Online Article RSS Article
  10. Application of indigenous knowledge to flood prevention and management

    Published 2012
    Subjects: “…Indigenous knowledge, flooding communities, flood management, livelihood security…”
    Full Text Available
    Access Repository
    Article
  11. Livelihood Outcomes of Beneficiaries of University-Based Agricultural Extension System in Southwestern Nigeria

    Published 2016
    Subjects: “…Food security…”
    Full Text Available
    Access Repository
    Thesis
  12. Evaluation of African catfish Clarias gariepinus responses to graded levels of zinc practical diet

    Published 2016
    Subjects: “…Food security…”
    Full Text Available
    Access Repository
    Conference Proceeding
  13. Electoral violence and its implications on voters participation in the 2019 elections in Ogun State, Nigeria

    Published 2019
    Subjects: “…Security…”
    Full Text Available
    Access Repository
    Article
  14. Cloud-native AI Pipelines for Continuous Infrastructure Optimization and Anomaly Detection

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  15. Three-dimensional Decision Task Offloading Model in Mobile Edge Computing

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  16. Interference-aware Deep Quantum Neural Network for NOMA Channel Estimation via Adaptive Energy Valley Optimization

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  17. Advances in Malware Detection using Machine Learning and Deep Learning: A Comprehensive Comparative Analysis

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article