A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is text/html
.
Filters
An AI-Enabled Hybrid Lightweight Authentication Model for Digital Healthcare Using Industrial Internet of Things Cyber-Physical Systems
2022
Sensors
To address the authentication and data privacy issues in smart healthcare, in this paper we propose a lightweight hybrid deep learning protocol to achieve security and privacy. ...
Efficient authentication and secure data transmission are the influential impediments of these networks that need to be addressed to maintain credence among clients, healthcare specialists, pharmacologists ...
Multi-agent Systems for Distributed Data Mining Techniques: An Overview. In Big Data Intelligence for Smart Applications; Springer: Cham, Switzerland, 2022; pp. 7–92. ...
doi:10.3390/s22041448
pmid:35214350
pmcid:PMC8875865
fatcat:hvhiuo4o4zfepkhgqn2ghes2p4
AFTER GLOBALIZATION: FUTURE SECURITY IN A TECHNOLOGY RICH WORLD
2002
AIDS and Infectious Diseases
National Laboratory on threats that might come against the US and its allies in the 2015 to 2020 timeframe due to the global availability of advanced technology. ...
discussed the workshop findings to determine what is most certain, and uncertain, and what might be needed to resolve our uncertainties. . ...
Plant programmable Trojan agents designed to corrupt data and processing in accounting and transfer hardware and software. ...
doi:10.1142/9789812776945_0021
fatcat:e63bnhpdjfa5vghjlybcmfmjqq
Islamic Republic of Afghanistan: Detailed Assessment Report on Anti-Money Laundering and Combating the Financing of Terrorism
2011
IMF Staff Country Reports
and professions should be subjected to the provisions of the AML and CFT laws; Encourage the development and use of modern and secure technologies, such as the electronic salary payment delivery system ...
For instance, the government is currently disbursing the salaries of four thousand employees including police officers electronically and there are plans to expand the technology to enable wider use of ...
No requirement on update of CDD data and information. ...
doi:10.5089/9781463923938.002
fatcat:662xzj5pv5aafilfvv53ta3axm
Colombia: Financial Sector Assessment Program-Detailed Assessment Report on Anti-Money Laundering and Combating the Financing of Terrorism
2018
IMF Staff Country Reports
The UIAF provides a couple of recent cases related to corruption and gold dealers where the analysis techniques of big data and data mining were used. ...
have been rated as high risk, including with respect to illicit mining, extortion, and kidnapping. ...
to regulatory, prudential and AML/CFT information. • Competent authorities do not have a legal framework specifically allowing them to exchange information indirectly with non-counterparts. ...
doi:10.5089/9781484384411.002
fatcat:jmeay6fxofchphq2vuppzedisq
'We don't want you to think criminal thoughts'
[article]
2016
The PhD Series of the Faculty of Social Sciences
illicit activities. ...
I have consequently examined the following: the messages that the programme instructors send and the messages that the participants receive; the normative implications of the programmes; the values that ...
Artiklen er forankret i etnografiske data fra feltarbejde i et åbent og to lukkede faengsler, hvor jeg har foretaget deltagerobservation og interviews med såvel deltagere som instruktører i programmet. ...
doi:10.5278/vbn.phd.socsci.00042
fatcat:w7x6z2xklnhm5paiufxoewziw4
UN peacekeeping in Namibia
2018
Figshare
And today, it is considered to be a safe, stabile state where there are no gunfights or political persecution any more, so the country is rarely presented in the CNN news. ...
The United Nations Transition Assistance Group operation in Namibia in 1989 was a turning point in the shift from traditional peacekeeping procedure to a new generation of multidisciplinary process. ...
Acknowledgements The research work partly summarised in this paper was carried out in the Faculty of Mechanical Engineering and Informatics at the University of Miskolc, Hungary, as part of the TÁMOP-4.2.2 ...
doi:10.6084/m9.figshare.7022216.v1
fatcat:hvjlnc6yvjf2zhmiu6mzi35h54
Cannabis sales and immigrant youth gangs in Denmark – An exploratory study of market structure and youth gang evolution
2017
Journal of Scandinavian Studies in Criminology and Crime Prevention
The second concept is security and in particular security governance. ...
Contemporary understandings of security often highlight the importance of the distinction between objective and subjective security (G. ...
They are left to interpret and evaluate the different messages themselves. ...
doi:10.1080/14043858.2017.1305038
fatcat:5c27lf4s6bhzdfgd4erhaudp6a
Islamic State of Afghanistan: Rebuilding a Macroeconomic Framework for Reconstruction and Growth
2003
IMF Staff Country Reports
To assist the IMF in evaluating the publication policy, reader comments are invited and may be sent by e-mail to publicationpolicy@imf.org. ...
The policy of publication of staff reports and other documents allows for the deletion of market-sensitive information. ...
and was not monitored by electronic surveillance or access technology. ...
doi:10.5089/9781451800159.002
fatcat:ugaku7uu5bgpvpbo5fabacerqi
The Sustainable Value of Open Government Data
2019
Journal of the AIS
For providing general support, access to data and enlightening conversations, we would like to extend our gratitude to the Basic Data Team at the Danish Agency for Digitization, the data-veterans at KMD ...
Acknowledgments We would like to thank the editors of this special issue and the anonymous reviewers for their insightful comments and constructive feedback. ...
The plan is to tackle: illicit financial flows, the hidden company ownership that makes such flows possible, land grabs, and the secrecy by which big oil, gas and mining corporations are doing business ...
doi:10.17705/1jais.00549
fatcat:esefzxg2hva7vbtmvkuokfm3bq
EPPO: A Challenging, Balance-Striking Exercise in the National and EU Judicial Environment
2021
eucrim – The European Criminal Law Associations Forum
respect for private life and the protection of personal data in electronic communications" (e-Privacy Regulation). ...
The main shortcomings of the framework are: Poorly defined concept of risk and insufficiently detailed norms; Lack of important features, e.g., appropriate data-mining techniques and appropriate methods ...
Sole responsibility lies with the author of the contribution. The publisher and the Commission are not responsible for any use that may be made of the information contained therein. ...
doi:10.30709/eucrim-2021-012
fatcat:7thk5dsr4be73onhkubqd3cj4e
The 12th International Conference on Instrumental Analysis—Modern Trends and Applications (20–23 September 2021, Virtual Event)
2021
Applied Sciences
of Athens, during 20–23 September 2021 as a virtual event, providing the opportunity for high-level analytical scientists from all around the world to promote their relevant research [...] ...
The 12th International Conference on "Instrumental Methods of Analysis" www.ima2021.gr (accessed on 8 November 2021)), was organized by the Aristotle University of Thessaloniki and National Technical University ...
Acknowledgments: The research leading to these results has received funding from Hellenic Foundation for Research and Innovation under NutrID project, "Novel technologies of isolation and micro-nano encapsulation ...
doi:10.3390/app112411767
fatcat:i2wzlzgn7zd5neyob4paktpe6i
D2.1 5G Security: Current Status and Future Trends
2020
Zenodo
domain of 5G security, the relevant 5G projects, and open source initiatives; and a description of future trends and technologies in 5G networks, their limitations, and gaps related to the security of ...
This deliverable aims to provide a basis for the identification of use cases and the development of 5G security enablers in INSPIRE-5Gplus. ...
To this end, the platform shall be able to support the exchange of request and response messages involving multiple actors. ...
doi:10.5281/zenodo.4569519
fatcat:7aersbhzyrccrn563shazvj4dq
Global Health: Refugees and Caring for the Forgotten
[chapter]
2018
Introduction to International Political Economy
remain a technologically inno vative country. 20 Many Japanese electronics companies also outsource electronics production to contractors in China. ...
, Production and Transfer of Anti-Personnel Mines and on their Destruction-known more commonly as the Mine Ban Treaty. ...
For example, digitization enables government database mining, biometric identi�cation, and better electronic eavesdropping. 20 Currency printing innovations help governments stave off counterfeit paper ...
doi:10.4324/9781315463452-27
fatcat:7qlzfc5jafbapnh7blw7wujszq
Turning the Tide on HIV: 23rdAnnual Canadian Conference on HIV/AIDS Research
2014
Canadian Journal of Infectious Diseases and Medical Microbiology
to appropriate electronic technologies. ...
In addition to providing clean works, the Messagers also act as harm reduction promotion agents. ...
The Northern Uganda cohort (Cango Lyec Project) allowed us to assess the prevalence and risk factors for depression and PTSD among people in the aftermath of war. ...
doi:10.1155/2014/148567
fatcat:vsfzrkkh7fd6hezjlreppkb7fm
Afro-Regions: The dynamics of cross-border micro-regionalism in Africa
2010
African Affairs
and fighting. ...
' houses, one shop belonging to the mine, and so forth. ...
doi:10.1093/afraf/adq069
fatcat:b6cbz3vuzbf2bmm6bxdvagkcpi
« Previous
Showing results 1 — 15 out of 141 results