Search Results - (severity OR security)

  1. Ascending stepped cryptanalytic time-memory trade-off

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  2. SpoofLearner: Inducing Deceptive Results in Deep Learning SCA via Low-Order Leakage

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  3. Faster $$text {GF}(2)[x]$$ polynomial multiplication using SIMD instructions

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  4. A fresh look on asymmetric crypto: accelerating WolfSSL on end-nodes processors

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  5. Contributions of non-timber forest products to household food security and income around Onigambari forest reserve, Oyo State, Nigeria

    Published 2007
    Full Text Available
    Access Repository
    Article
  6. Impact of Root and Tuber Expansion Programme Technology Adoption on Poverty and Food Security Status of Cassava- Farming Households in Southwestern Nigeria

    Published 2011
    Full Text Available
    Access Repository
    Thesis
  7. MULTI-ANALYTIC FACTORS PREDICTING ORGANIZATIONAL CITIZENSHIP BEHAVIOUR AMONG PERSONNEL OF NIGERIA SECURITY AND CIVIL DEFENCE CORPS IN THE SOUTHWEST, NIGERIA

    Published 2016-05
    Subjects: “…Nigeria security and civil defence corps…”
    Full Text Available
    Access Repository
    Article
  8. Nigeria at hundred: teachers’ and students’ perception of the adequacy of upper basic education social studies curriculum as a tool for national security

    Published 2015-06
    Subjects: “…Students and National Security…”
    Full Text Available
    Access Repository
    Article
  9. Bushmeat consumption frequency and preferences among rural households in a West African savanna landscape: Implications for food security and conservation

    Published in People and Nature (2025)
    Get full text
    Online Article RSS Article
  10. A Real-Time Multi-Tier Machine Learning Intrusion Detection Framework for Securing Ground Control Station–UAV Communications

    Get full text
    Online Article RSS Article
  11. Agent Name Service (ANS): A Proof-of-Concept Trust Layer for Secure AI Agent Discovery, Identity, and Governance in Kubernetes

    Published in ArXiv cs.MA Recent Papers (2026)
    Get full text
    Online Article RSS Article
  12. A Framework of Variable-Length Source Encryption using Mutual Information Security Criterion: Universal Coding, Strong Converse Theorem

    Published in ArXiv cs.IT Recent Papers (2026)
    Get full text
    Online Article RSS Article
  13. Analisis Kerentanan Website SMK Muhammadiyah 2 Bontoala Makassar Menggunakan Metode OWASP (Open Web Application Security Project)

    Published in BIOS (2025)
    Get full text
    Online Article RSS Article