Search alternatives:
larger » large (Expand Search)
decrease » increase (Expand Search)
Showing 1 - 20 results of 170 for search '(( significant security based ) OR ( significant ((larger decrease) OR (largest decrease)) ))', query time: 0.11s Refine Results
  1. 1

    Maternal secure base support and preschoolers' secure base behavior in natural environments by Kaloustian, Garene

    Published 2007
    “…Overall, findings indicated that maternal secure base support was significantly related to the organization of child secure base behavior (r = .31 and .49 for Study 1 and Study 2, respectively). …”
    Get full text
    Get full text
    Get full text
    article
  2. 2

    Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices by Habib Ullah Khan (12024579)

    Published 2023
    “…Most of the security methods and procedures provided by researchers are based on existing Internet security practices. …”
  3. 3

    Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices by Habib Ullah, Khan

    Published 2023
    “…Most of the security methods and procedures provided by researchers are based on existing Internet security practices. …”
    Get full text
    Get full text
    Get full text
    article
  4. 4

    Security Analysis of Integrated HAP-Based FSO and UAV-Enabled RF Downlink Communications by Mohammad Javad Saber (4334227)

    Published 2024
    “…Our results reveal the significant impact of atmospheric turbulence, RF fading, pointing errors, and optical detection technologies on the overall secrecy performance, providing valuable insights for designing secure mixed FSO and RF downlink communication systems.…”
  5. 5
  6. 6

    Degree-Based Network Anonymization by Halawi, Ola

    Published 2020
    “…The consequent privacy and data security concerns have motivated the work on degree-based data anonymization. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  7. 7

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…Therefore, the proposed work, in this paper, is based on the Least Significant Bit (LSB) substitution method. …”
  8. 8
  9. 9
  10. 10

    Security Supply Chain Using UAVs: Validation and Development of a UAV-Based Model for Qatar’s Mega Sporting Events by Khalifa AL-Dosari (17931434)

    Published 2023
    “…This study also confirmed the validity and reliability of the newly developed scales, offering practical and proposed implications for the IT and security industries. The key findings of the study are: (1) a valid and reliable UAV-based cybersecurity framework for FIFA mega sporting events was developed; (2) five critical factors were identified, including traceability, security and privacy, trust, acceptability, and preparedness; (3) all factors were significantly and positively correlated, highlighting the complexity of managing security systems in mega sporting events.…”
  11. 11

    Consortium Blockchain-Based Decentralized Stock Exchange Platform by Hamed Al-Shaibani (19497412)

    Published 2020
    “…In this paper, we present a novel blockchain-based architecture for a fully decentralized stock market. …”
  12. 12

    Secure Uplink IM-OFDMA With Artificial IQ Imbalance by Ozgur Alaca (17949101)

    Published 2023
    “…<p dir="ltr">This study proposes a novel secure uplink index modulation-based orthogonal frequency division multiple access (IM-OFDMA) systems using artificial in-phase and quadrature imbalance (A-IQI). …”
  13. 13
  14. 14

    Secure and Anonymous Communications Over Delay Tolerant Networks by Spiridon Bakiras (16896408)

    Published 2020
    “…As such, our protocol does not list the intermediate nodes along the route's path and, therefore, enhances significantly the anonymity of the underlying communications. …”
  15. 15
  16. 16

    Competition vs cooperation: An agent based model for sustainable tomatoes’ import system by Sarah Namany (17268922)

    Published 2024
    “…Interactions between trade partners are modeled using two game theoretic approaches counting<u> Cournot</u><u> competition</u> and <u>Cartel</u> collusion. Based on the research findings, a competitive global market can bring economic benefits to Qatar as an importing nation, but this approach also entails substantial <u>water consumption</u> and results in significant environmental emissions. …”
  17. 17
  18. 18

    An Energy-Water-Food Nexus-based Decision-making Framework to Guide National Priorities in Qatar by Sarah Namany (17268922)

    Published 2021
    “…The water system has also displayed a low security level, represented by a high criticality score of 0.14 in comparison with the food and energy sectors. …”
  19. 19

    Transforming Towards Secure Global Trade for Customs Administrations Powered by Blockchain by Abunqira, Hussam

    Published 2020
    “…The trade supply chain involves several participants each performs its task based on the documents that are provided by the other participant in the trade supply chain. …”
    Get full text
  20. 20

    Hybrid deep learning based threat intelligence framework for Industrial IoT systems by Jahanzaib Malik (23718816)

    Published 2025
    “…However, the increased pervasiveness, reduced human involvement, resource-constrained nature of underlying IoT devices, dynamic and shared spectrum of 4G/5G communication, and reliance on the cloud for outsourced massive storage and computation bring novel security challenges and concerns. A significant challenge currently confronting the Industrial Internet of Things (IIoT) is the increasing prevalence of sophisticated IoT malware threats and attacks. …”