CINXE.COM

Search results for: security.

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: security.</title> <meta name="description" content="Search results for: security."> <meta name="keywords" content="security."> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="security." name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="security."> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 2798</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: security.</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2618</span> Assessing EU-China Security Interests from Contradiction to Convergence</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Julia%20Gurol">Julia Gurol</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Why do we observe a shift towards convergence in EU-China security interests? While contradicting attitudes towards key principles of inter-state and region-to-state relations, including state sovereignty, territorial integrity, and intervention policies have ever since hindered EU-China inter-regional cooperation beyond the economic realm, collaboration in peace and security issues is now becoming a key pillar of European-Chinese relations. In addition, the Belt and Road Initiative as most ambitious Chinese foreign policy project explicitly touches upon several European foreign policy and security preferences. Based on these counterintuitive findings, this paper traces the process of convergence of Sino-European security interests. Drawing on qualitative text analysis of official Chinese and European policy papers and documents from the establishment of diplomatic relations in 1975 until today, it assesses the striking change over time. On this basis, the paper uses theories of neo-functionalism, inter-regionalism, and securitization and borrows from constructivist views in International Relations’ theory, to expound possible motives for the change in Chinese and respectively European preferences in the security realm. The results reveal interesting insights into the decisive factors and motives behind both countries’ foreign policies. The paper concludes with a discussion of further potential and difficulties of EU-China security cooperation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=belt%20and%20road%20initiative" title="belt and road initiative">belt and road initiative</a>, <a href="https://publications.waset.org/abstracts/search?q=China" title=" China"> China</a>, <a href="https://publications.waset.org/abstracts/search?q=European%20Union" title=" European Union"> European Union</a>, <a href="https://publications.waset.org/abstracts/search?q=foreign%20policy" title=" foreign policy"> foreign policy</a>, <a href="https://publications.waset.org/abstracts/search?q=neo-functionalism" title=" neo-functionalism"> neo-functionalism</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/90089/assessing-eu-china-security-interests-from-contradiction-to-convergence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/90089.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">285</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2617</span> Food Security Model and the Role of Community Empowerment: The Case of a Marginalized Village in Mexico, Tatoxcac, Puebla</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Marco%20Antonio%20Lara%20De%20la%20Calleja">Marco Antonio Lara De la Calleja</a>, <a href="https://publications.waset.org/abstracts/search?q=Mar%C3%ADa%20Catalina%20Ovando%20Chico"> María Catalina Ovando Chico</a>, <a href="https://publications.waset.org/abstracts/search?q=Eduardo%20Lopez%20Ruiz"> Eduardo Lopez Ruiz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Community empowerment has been proved to be a key element in the solution of the food security problem. As a result of a conceptual analysis, it was found that agricultural production, economic development and governance, are the traditional basis of food security models. Although the literature points to social inclusion as an important factor for food security, no model has considered it as the basis of it. The aim of this research is to identify different dimensions that make an integral model for food security, with emphasis on community empowerment. A diagnosis was made in the study community (Tatoxcac, Zacapoaxtla, Puebla), to know the aspects that impact the level of food insecurity. With a statistical sample integrated by 200 families, the Latin American and Caribbean Food Security Scale (ELCSA) was applied, finding that: in households composed by adults and children, have moderated food insecurity, (ELCSA scale has three levels, low, moderated and high); that result is produced mainly by the economic income capacity and the diversity of the diet on its food. With that being said, a model was developed to promote food security through five dimensions: 1. Regional context of the community; 2. Structure and system of local food; 3. Health and nutrition; 4. Information and technology access; and 5. Self-awareness and empowerment. The specific actions on each axis of the model, allowed a systemic approach needed to attend food security in the community, through the empowerment of society. It is concluded that the self-awareness of local communities is an area of extreme importance, which must be taken into account for participatory schemes to improve food security. In the long term, the model requires the integrated participation of different actors, such as government, companies and universities, to solve something such vital as food security. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=community%20empowerment" title="community empowerment">community empowerment</a>, <a href="https://publications.waset.org/abstracts/search?q=food%20security" title=" food security"> food security</a>, <a href="https://publications.waset.org/abstracts/search?q=model" title=" model"> model</a>, <a href="https://publications.waset.org/abstracts/search?q=systemic%20approach" title=" systemic approach"> systemic approach</a> </p> <a href="https://publications.waset.org/abstracts/62914/food-security-model-and-the-role-of-community-empowerment-the-case-of-a-marginalized-village-in-mexico-tatoxcac-puebla" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/62914.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">372</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2616</span> The Study of Security Techniques on Information System for Decision Making</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tejinder%20Singh">Tejinder Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=information%20systems" title="information systems">information systems</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20integrity" title=" data integrity"> data integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=TCP%2FIP%20network" title=" TCP/IP network"> TCP/IP network</a>, <a href="https://publications.waset.org/abstracts/search?q=vulnerability" title=" vulnerability"> vulnerability</a>, <a href="https://publications.waset.org/abstracts/search?q=decision" title=" decision"> decision</a>, <a href="https://publications.waset.org/abstracts/search?q=data" title=" data"> data</a> </p> <a href="https://publications.waset.org/abstracts/37151/the-study-of-security-techniques-on-information-system-for-decision-making" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/37151.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">307</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2615</span> Integrating Blockchain and Internet of Things Platforms: An Empirical Study on Immunization Cold Chain</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fawzia%20Abujalala">Fawzia Abujalala</a>, <a href="https://publications.waset.org/abstracts/search?q=Asma%20Elmangoush"> Asma Elmangoush</a>, <a href="https://publications.waset.org/abstracts/search?q=Majdi%20Ashibani"> Majdi Ashibani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The adoption of Blockchain technology introduces the possibility to decentralize cold chain systems. This adaptation enhances them to be more efficient, accessible, verifiable, and data security. Additionally, the Internet of Things (IoT) concept is considered as an added-value to various application domains. Cargo tracking and cold chain are a few to name. However, the security of the IoT transactions and integrated devices remains one of the key challenges to the IoT application’s success. Consequently, Blockchain technology and its consensus protocols have been used to solve many information security problems. In this paper, the researchers discussed the advantages of integrating Blockchain technology into IoT platform to improve security and provide an overview of existing literature on integrating Blockchain and IoT platforms. Then, presented the immunization cold chain solution as a use-case that could apply to any critical goods based on integrating hyperledger fabric platform and IoT platform. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain" title="blockchain">blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=hyperledger%20fabric" title=" hyperledger fabric"> hyperledger fabric</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title=" internet of things"> internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=traceability" title=" traceability"> traceability</a> </p> <a href="https://publications.waset.org/abstracts/135064/integrating-blockchain-and-internet-of-things-platforms-an-empirical-study-on-immunization-cold-chain" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/135064.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">149</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2614</span> Shifting of Global Energy Security: A Comparative Analysis of Indonesia and China’s Renewable Energy Policies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Widhi%20Hanantyo%20Suryadinata">Widhi Hanantyo Suryadinata</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Efforts undertaken by Indonesia and China to shift the strategies and security of renewable energy on a global stage involve approaches through policy construction related to rare minerals processing or value-adding in Indonesia and manufacturing policies through the New Energy Vehicles (NEVs) policy in China. Both policies encompass several practical regulations and policies that can be utilized for the implementation of Indonesia and China's grand efforts and ideas. Policy development in Indonesia and China can be analyzed using a comparative analysis method, as well as employing a pyramid illustration to identify policy construction phases based on the real conditions of the domestic market and implemented policies. This approach also helps to identify the potential integration of policies needed to enhance the policy development phase of a country within the pyramid. It also emphasizes the significance of integration policy to redefine renewable energy strategy and security on the global stage. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=global%20renewable%20energy%20security" title="global renewable energy security">global renewable energy security</a>, <a href="https://publications.waset.org/abstracts/search?q=global%20energy%20security" title=" global energy security"> global energy security</a>, <a href="https://publications.waset.org/abstracts/search?q=policy%20development" title=" policy development"> policy development</a>, <a href="https://publications.waset.org/abstracts/search?q=comparative%20analysis" title=" comparative analysis"> comparative analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=shifting%20of%20global%20energy%20security" title=" shifting of global energy security"> shifting of global energy security</a>, <a href="https://publications.waset.org/abstracts/search?q=Indonesia" title=" Indonesia"> Indonesia</a>, <a href="https://publications.waset.org/abstracts/search?q=China" title=" China"> China</a> </p> <a href="https://publications.waset.org/abstracts/184007/shifting-of-global-energy-security-a-comparative-analysis-of-indonesia-and-chinas-renewable-energy-policies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/184007.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">69</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2613</span> Multi-Dimension Threat Situation Assessment Based on Network Security Attributes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yang%20Yu">Yang Yu</a>, <a href="https://publications.waset.org/abstracts/search?q=Jian%20Wang"> Jian Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Jiqiang%20Liu"> Jiqiang Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Lei%20Han"> Lei Han</a>, <a href="https://publications.waset.org/abstracts/search?q=Xudong%20He"> Xudong He</a>, <a href="https://publications.waset.org/abstracts/search?q=Shaohua%20Lv"> Shaohua Lv</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As the increasing network attacks become more and more complex, network situation assessment based on log analysis cannot meet the requirements to ensure network security because of the low quality of logs and alerts. This paper addresses the lack of consideration of security attributes of hosts and attacks in the network. Identity and effectiveness of Distributed Denial of Service (DDoS) are hard to be proved in risk assessment based on alerts and flow matching. This paper proposes a multi-dimension threat situation assessment method based on network security attributes. First, the paper offers an improved Common Vulnerability Scoring System (CVSS) calculation, which includes confident risk, integrity risk, availability risk and a weighted risk. Second, the paper introduces deterioration rate of properties collected by sensors in hosts and network, which aimed at assessing the time and level of DDoS attacks. Third, the paper introduces distribution of asset value in security attributes considering features of attacks and network, which aimed at assessing and show the whole situation. Experiments demonstrate that the approach reflects effectiveness and level of DDoS attacks, and the result can show the primary threat in network and security requirement of network. Through comparison and analysis, the method reflects more in security requirement and security risk situation than traditional methods based on alert and flow analyzing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=DDoS%20evaluation" title="DDoS evaluation">DDoS evaluation</a>, <a href="https://publications.waset.org/abstracts/search?q=improved%20CVSS" title=" improved CVSS"> improved CVSS</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20security%20attribute" title=" network security attribute"> network security attribute</a>, <a href="https://publications.waset.org/abstracts/search?q=threat%20situation%20assessment" title=" threat situation assessment"> threat situation assessment</a> </p> <a href="https://publications.waset.org/abstracts/88121/multi-dimension-threat-situation-assessment-based-on-network-security-attributes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/88121.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">209</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2612</span> A Study of User Awareness and Attitudes Towards Civil-ID Authentication in Oman’s Electronic Services</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Raya%20Al%20Khayari">Raya Al Khayari</a>, <a href="https://publications.waset.org/abstracts/search?q=Rasha%20Al%20Jassim"> Rasha Al Jassim</a>, <a href="https://publications.waset.org/abstracts/search?q=Muna%20Al%20Balushi"> Muna Al Balushi</a>, <a href="https://publications.waset.org/abstracts/search?q=Fatma%20Al%20Moqbali"> Fatma Al Moqbali</a>, <a href="https://publications.waset.org/abstracts/search?q=Said%20El%20Hajjar"> Said El Hajjar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study utilizes linear regression analysis to investigate the correlation between user account passwords and the probability of civil ID exposure, offering statistical insights into civil ID security. The study employs multiple linear regression (MLR) analysis to further investigate the elements that influence consumers’ views of civil ID security. This aims to increase awareness and improve preventive measures. The results obtained from the MLR analysis provide a thorough comprehension and can guide specific educational and awareness campaigns aimed at promoting improved security procedures. In summary, the study’s results offer significant insights for improving existing security measures and developing more efficient tactics to reduce risks related to civil ID security in Oman. By identifying key factors that impact consumers’ perceptions, organizations can tailor their strategies to address vulnerabilities effectively. Additionally, the findings can inform policymakers on potential regulatory changes to enhance civil ID security in the country. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=civil-id%20disclosure" title="civil-id disclosure">civil-id disclosure</a>, <a href="https://publications.waset.org/abstracts/search?q=awareness" title=" awareness"> awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=linear%20regression" title=" linear regression"> linear regression</a>, <a href="https://publications.waset.org/abstracts/search?q=multiple%20regression" title=" multiple regression"> multiple regression</a> </p> <a href="https://publications.waset.org/abstracts/185886/a-study-of-user-awareness-and-attitudes-towards-civil-id-authentication-in-omans-electronic-services" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/185886.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">57</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2611</span> Enhancing Metaverse Security: A Multi-Factor Authentication Scheme</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=R.%20Chinnaiyaprabhu">R. Chinnaiyaprabhu</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Bharanidharan"> S. Bharanidharan</a>, <a href="https://publications.waset.org/abstracts/search?q=V.%20Dharsana"> V. Dharsana</a>, <a href="https://publications.waset.org/abstracts/search?q=Rajalavanya"> Rajalavanya</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The concept of the Metaverse represents a potential evolution in the realm of cyberspace. In the early stages of Web 2.0, we observed a proliferation of online pseudonyms or 'nyms,' which increased the prevalence of fake accounts and made it challenging to establish unique online identities for various roles. However, in the era of Web 3.0, particularly in the context of the Metaverse, an individual's digital identity is intrinsically linked to their real-world identity. Consequently, actions taken in the Metaverse can carry significant consequences in the physical world. In light of these considerations, we propose the development of an innovative authentication system known as 'Metasec.' This system is designed to enhance security for digital assets, online identities, avatars, and user accounts within the Metaverse. Notably, Metasec operates as a password less authentication solution, relying on a multifaceted approach to security, encompassing device attestation, facial recognition, and pattern-based security keys. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=metaverse" title="metaverse">metaverse</a>, <a href="https://publications.waset.org/abstracts/search?q=multifactor%20authentication" title=" multifactor authentication"> multifactor authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=facial%20recognition" title=" facial recognition"> facial recognition</a>, <a href="https://publications.waset.org/abstracts/search?q=patten%20password" title=" patten password"> patten password</a> </p> <a href="https://publications.waset.org/abstracts/173767/enhancing-metaverse-security-a-multi-factor-authentication-scheme" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/173767.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">67</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2610</span> Rethinking the Role of Small States in the Hybrid Era: Shifts in the Cypriot Foreign and Defence Policies, 2004-2019</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Constantinos%20Adamides">Constantinos Adamides</a>, <a href="https://publications.waset.org/abstracts/search?q=Petros%20Petrikkos"> Petros Petrikkos</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the era of growing hybrid threats, small states find themselves in need to re-evaluate existing foreign and defense policies. The pressure to establishing or maintain a status of a reliable partner in the community in which they belong to, vis-à-vis their multilateral relations with other organisations and entities, small states may need to shift their policies in the field to accommodate security needs that are not only pertinent to their security, but also to that of the organisations (bloc) in which they interact. Unlike potential shortcomings in a small state’s mainstream security and defence framework where the threat would be limited to the state itself, in more contemporary times with dominating hybrid threats, the small states’ security shortcomings may also become a security problem for the bloc in which these states belong to. An indicative example is small states like Cyprus and Malta, which belong and 'interact' in the European Union. As a result, the nature of hybrid threats can be utilised to hurt bigger states in a bloc by exploiting the small states’ vulnerabilities and security gaps. Inevitably, both the defensive and foreign policy collaborations of small states with bigger states have been and are constantly re-evaluated to tackle and prevent such problems. In essence, the goal of this ‘re-evaluation’ aims to achieve a twofold goal: The first is the small states’ quest to appear as a reliable partner within the bloc, while the second is to avoid being the weakest security link in the bloc’s defence against hybrid threats. Indeed, the hybrid arena is a security area where they can excel in the bloc, despite the potential and expected conventional military deficiencies. This new environment prompts us to think security from the perspective of small states differently and in relation to their role as members or big organisations. The paper focuses on the case of Cyprus following its accession to the European Union and examines how a country that has had a very focused security orientation –not least due to its ongoing security problems– altered its foreign and defence policies within the European Union to ensure compliance with the rest of the bloc, while at the same time maximizing its role as a security player. Specifically, it examines the methods through which the country shifted its policies as well as the challenges and opportunities that emerged from these security shifts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cyprus" title="Cyprus">Cyprus</a>, <a href="https://publications.waset.org/abstracts/search?q=defence" title=" defence"> defence</a>, <a href="https://publications.waset.org/abstracts/search?q=foreign%20policy" title=" foreign policy"> foreign policy</a>, <a href="https://publications.waset.org/abstracts/search?q=hybrid%20threats" title=" hybrid threats"> hybrid threats</a>, <a href="https://publications.waset.org/abstracts/search?q=ontological%20security" title=" ontological security"> ontological security</a>, <a href="https://publications.waset.org/abstracts/search?q=small%20states" title=" small states"> small states</a> </p> <a href="https://publications.waset.org/abstracts/117863/rethinking-the-role-of-small-states-in-the-hybrid-era-shifts-in-the-cypriot-foreign-and-defence-policies-2004-2019" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/117863.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">136</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2609</span> Military Role of Russia beyond Its National Boundary</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nipuli%20Gajanayake">Nipuli Gajanayake</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Russian military role beyond its national frontier has become a debatable hot topic in the international political arena. It’s advanced, and strategic responses in combating regional and international security problems have always been a factor to debate and criticize. Under such critical circumstances, Russia is attentive to play its military role according to the provisions of the Military Doctrine of the Russian Federation. Most importantly, the legal basis of the doctrine has also consisted with the generally recognized principles and norms of international law. Therefore, Russian international military assistances are pledged to accomplish international peace and security. The expansion of Russian military participation in the United Nations Peacekeeping operations, and military- political, and technical cooperation have largely evident the great effort of Russia in maintaining and restoring international peace and security. Moreover, the conflict management diplomacy and the development of dialogue with nation states to confront military risks and threats can also identify as a part of preserving international peace and security. In addition, Russia strives to strengthen the system of collective security with regional and international organizations through the legal framework of the Collective Security Treaty Organization (CSTO). Maintaining cooperative ties with the Commonwealth of Independent States (CIS), the Organization for Security and Cooperation in Europe (OSCE) and the Shanghai Cooperation Organization (SCO) have highlighted the Russian deliberation on maintaining regional peace and security. Nevertheless, the extension of cordial relations with nation states and providing of military assistances during tensions and conflicts on their territories can also underscore as Russians commitments on maintaining international peace and security. Observing and recognizing the disparity between the West portrayed terms like ‘illegal Russian interventions’ and the comprehensive reality behind the ‘Russian military assistances’ are important to understand. However, a lopsided vision or a perspective towards the Russian international military role would not present a clear understanding about its valued and also dedicated hard work on maintaining international peace and security. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=collective%20security" title="collective security">collective security</a>, <a href="https://publications.waset.org/abstracts/search?q=diplomacy" title=" diplomacy"> diplomacy</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20military%20role%20of%20Russia" title=" international military role of Russia"> international military role of Russia</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20peace%20and%20security" title=" international peace and security"> international peace and security</a> </p> <a href="https://publications.waset.org/abstracts/71135/military-role-of-russia-beyond-its-national-boundary" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71135.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">301</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2608</span> On Dynamic Chaotic S-BOX Based Advanced Encryption Standard Algorithm for Image Encryption</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ajish%20Sreedharan">Ajish Sreedharan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Security in transmission and storage of digital images has its importance in today’s image communications and confidential video conferencing. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Advanced Encryption Standard (AES) is a well known block cipher that has several advantages in data encryption. However, it is not suitable for real-time applications. This paper presents modifications to the Advanced Encryption Standard to reflect a high level security and better image encryption. The modifications are done by adjusting the ShiftRow Transformation and using On Dynamic chaotic S-BOX. In AES the Substitute bytes, Shift row and Mix columns by themselves would provide no security because they do not use the key. In Dynamic chaotic S-BOX Based AES the Substitute bytes provide security because the S-Box is constructed from the key. Experimental results verify and prove that the proposed modification to image cryptosystem is highly secure from the cryptographic viewpoint. The results also prove that with a comparison to original AES encryption algorithm the modified algorithm gives better encryption results in terms of security against statistical attacks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=advanced%20encryption%20standard%20%28AES%29" title="advanced encryption standard (AES)">advanced encryption standard (AES)</a>, <a href="https://publications.waset.org/abstracts/search?q=on%20dynamic%20chaotic%20S-BOX" title=" on dynamic chaotic S-BOX"> on dynamic chaotic S-BOX</a>, <a href="https://publications.waset.org/abstracts/search?q=image%20encryption" title=" image encryption"> image encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20analysis" title=" security analysis"> security analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=ShiftRow%20transformation" title=" ShiftRow transformation"> ShiftRow transformation</a> </p> <a href="https://publications.waset.org/abstracts/16549/on-dynamic-chaotic-s-box-based-advanced-encryption-standard-algorithm-for-image-encryption" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16549.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">437</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2607</span> The Need for Educational Psychology in Teacher Education for Sustainable Transformation and Security in Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kaltume%20Kabir%20Sharrif">Kaltume Kabir Sharrif</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Teacher education is the bedrock of educational growth and development of any nation. With development in education all human problems can be overcome. Educational Psychology, on the other hand, is in a strategic position for any programme in teacher education to be successful hence other aspects of societal issues. In other words, no teacher education can be of any help in ensuring transformation and security without adequate study in Educational Psychology. Without adequate knowledge and skills in Educational Psychology the teacher may not function effectively in the course of discharging his duty. It is in view of this, that the paper discusses some aspects of Educational Psychology that are of paramount importance in teacher education for sustainable transformation and security of Nigeria. Some recommendations were offered on the role educational psychology play in resolving security challenges facing the country. These include enriching educational psychology with topics from forensic psychology that will provide the teacher the skills of fighting crime in the school, Behavioural Science Unit should be established in each school to monitor the behavior of students, among others. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=transformation" title="transformation">transformation</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20challenges" title=" security challenges"> security challenges</a>, <a href="https://publications.waset.org/abstracts/search?q=teacher%20education" title=" teacher education"> teacher education</a>, <a href="https://publications.waset.org/abstracts/search?q=educational%20psychology" title=" educational psychology"> educational psychology</a> </p> <a href="https://publications.waset.org/abstracts/23923/the-need-for-educational-psychology-in-teacher-education-for-sustainable-transformation-and-security-in-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23923.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">506</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2606</span> Smart Grids Cyber Security Issues and Challenges</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Imen%20Aouini">Imen Aouini</a>, <a href="https://publications.waset.org/abstracts/search?q=Lamia%20Ben%20Azzouz"> Lamia Ben Azzouz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The energy need is growing rapidly due to the population growth and the large new usage of power. Several works put considerable efforts to make the electricity grid more intelligent to reduce essentially energy consumption and provide efficiency and reliability of power systems. The Smart Grid is a complex architecture that covers critical devices and systems vulnerable to significant attacks. Hence, security is a crucial factor for the success and the wide deployment of Smart Grids. In this paper, we present security issues of the Smart Grid architecture and we highlight open issues that will make the Smart Grid security a challenging research area in the future. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=smart%20grids" title="smart grids">smart grids</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20meters" title=" smart meters"> smart meters</a>, <a href="https://publications.waset.org/abstracts/search?q=home%20area%20network" title=" home area network"> home area network</a>, <a href="https://publications.waset.org/abstracts/search?q=neighbor%20area%20network" title=" neighbor area network"> neighbor area network</a> </p> <a href="https://publications.waset.org/abstracts/35303/smart-grids-cyber-security-issues-and-challenges" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/35303.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">424</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2605</span> Parameter Selection for Computationally Efficient Use of the Bfvrns Fully Homomorphic Encryption Scheme</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cavidan%20Yakupoglu">Cavidan Yakupoglu</a>, <a href="https://publications.waset.org/abstracts/search?q=Kurt%20Rohloff"> Kurt Rohloff</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this study, we aim to provide a novel parameter selection model for the BFVrns scheme, which is one of the prominent FHE schemes. Parameter selection in lattice-based FHE schemes is a practical challenges for experts or non-experts. Towards a solution to this problem, we introduce a hybrid principles-based approach that combines theoretical with experimental analyses. To begin, we use regression analysis to examine the parameters on the performance and security. The fact that the FHE parameters induce different behaviors on performance, security and Ciphertext Expansion Factor (CEF) that makes the process of parameter selection more challenging. To address this issue, We use a multi-objective optimization algorithm to select the optimum parameter set for performance, CEF and security at the same time. As a result of this optimization, we get an improved parameter set for better performance at a given security level by ensuring correctness and security against lattice attacks by providing at least 128-bit security. Our result enables average ~ 5x smaller CEF and mostly better performance in comparison to the parameter sets given in [1]. This approach can be considered a semiautomated parameter selection. These studies are conducted using the PALISADE homomorphic encryption library, which is a well-known HE library. The abstract goes here. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=lattice%20cryptography" title="lattice cryptography">lattice cryptography</a>, <a href="https://publications.waset.org/abstracts/search?q=fully%20homomorphic%20encryption" title=" fully homomorphic encryption"> fully homomorphic encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=parameter%20selection" title=" parameter selection"> parameter selection</a>, <a href="https://publications.waset.org/abstracts/search?q=LWE" title=" LWE"> LWE</a>, <a href="https://publications.waset.org/abstracts/search?q=RLWE" title=" RLWE"> RLWE</a> </p> <a href="https://publications.waset.org/abstracts/146215/parameter-selection-for-computationally-efficient-use-of-the-bfvrns-fully-homomorphic-encryption-scheme" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/146215.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">154</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2604</span> Enhancement of Environmental Security by the Application of Wireless Sensor Network in Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmadu%20Girgiri">Ahmadu Girgiri</a>, <a href="https://publications.waset.org/abstracts/search?q=Lawan%20Gana%20Ali"> Lawan Gana Ali</a>, <a href="https://publications.waset.org/abstracts/search?q=Mamman%20M.%20Baba"> Mamman M. Baba</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Environmental security clearly articulates the perfections and developments of various communities around the world irrespective of the region, culture, religion or social inclination. Although, the present state of insecurity has become serious issue devastating the peace, unity, stability and progress of man and his physical environment particularly in developing countries. Recently, measure of security and it management in Nigeria has been a bottle-neck to the effectiveness and advancement of various sectors that include; business, education, social relations, politics and above all an economy. Several measures have been considered on mitigating environment insecurity such as surveillance, demarcation, security personnel empowerment and the likes, but still the issue remains disturbing. In this paper, we present the application of new technology that contributes to the improvement of security surveillance known as &ldquo;Wireless Sensor Network (WSN)&rdquo;. The system is new, smart and emerging technology that provides monitoring, detection and aggregation of information using sensor nodes and wireless network. WSN detects, monitors and stores information or activities in the deployed area such as schools, environment, business centers, public squares, industries, and outskirts and transmit to end users. This will reduce the cost of security funding and eases security surveillance depending on the nature and the requirement of the deployment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=application" title="application">application</a>, <a href="https://publications.waset.org/abstracts/search?q=environment" title=" environment"> environment</a>, <a href="https://publications.waset.org/abstracts/search?q=insecurity" title=" insecurity"> insecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=sensor" title=" sensor"> sensor</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20sensor%20network" title=" wireless sensor network"> wireless sensor network</a> </p> <a href="https://publications.waset.org/abstracts/44680/enhancement-of-environmental-security-by-the-application-of-wireless-sensor-network-in-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/44680.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">263</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2603</span> An Investigation on Interactions between Social Security with Police Operation and Economics in the Field of Tourism</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Mahdi%20Namdari">Mohammad Mahdi Namdari</a>, <a href="https://publications.waset.org/abstracts/search?q=Hosein%20Torki"> Hosein Torki</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Security as an abstract concept, has involved human being from the beginning of creation to the present, and certainly to the future. Accordingly, battles, conflicts, challenges, legal proceedings, crimes and all issues related to human kind are associated with this concept. Today by interviewing people about their life, the security of societies and Social crimes are interviewed too. Along with the security as an infrastructure and vital concept, the economy and related issues e.g. welfare, per capita income, total government revenue, export, import and etc. is considered another infrastructure and vital concept. These two vital concepts (Security and Economic) have linked together complexly and significantly. The present study employs analytical-descriptive research method using documents and Statistics of official sources. Discovery and explanation of this mutual connection are comprising a profound and extensive research; so management, development and reform in system and relationships of the scope of this two concepts are complex and difficult. Tourism and its position in today's economy is one of the main pillars of the economy of the 21st century that maybe associate with the security and social crimes more than other pillars. Like all human activities, economy of societies and partially tourism dependent on security especially in the public and social security. On the other hand, the true economic development (generally) and the growth of the tourism industry (dedicated) are a security generating and supporting for it, because a dynamic economic infrastructure prevents the formation of centers of crime and illegal activities by providing a context for socio-economic development for all segments of society in a fair and humane. This relationship is a formula of the complexity between the two concept of economy and security. Police as a revealed or people-oriented organization in the field of security directly has linked with the economy of a community and is very effective In the face of the tourism industry. The relationship between security and national crime index, and economic indicators especially ones related to tourism is confirming above discussion that is notable. According to understanding processes about security and economic as two key and vital concepts are necessary and significant for sovereignty of governments. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=economic" title="economic">economic</a>, <a href="https://publications.waset.org/abstracts/search?q=police" title=" police"> police</a>, <a href="https://publications.waset.org/abstracts/search?q=tourism" title=" tourism"> tourism</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20security" title=" social security"> social security</a> </p> <a href="https://publications.waset.org/abstracts/44498/an-investigation-on-interactions-between-social-security-with-police-operation-and-economics-in-the-field-of-tourism" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/44498.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">321</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2602</span> The Effectiveness of a Hybrid Diffie-Hellman-RSA-Advanced Encryption Standard Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdellahi%20Cheikh">Abdellahi Cheikh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the emergence of quantum computers with very powerful capabilities, the security of the exchange of shared keys between two interlocutors poses a big problem in terms of the rapid development of technologies such as computing power and computing speed. Therefore, the Diffie-Hellmann (DH) algorithm is more vulnerable than ever. No mechanism guarantees the security of the key exchange, so if an intermediary manages to intercept it, it is easy to intercept. In this regard, several studies have been conducted to improve the security of key exchange between two interlocutors, which has led to interesting results. The modification made on our model Diffie-Hellman-RSA-AES (DRA), which encrypts the information exchanged between two users using the three-encryption algorithms DH, RSA and AES, by using stenographic photos to hide the contents of the p, g and ClesAES values that are sent in an unencrypted state at the level of DRA model to calculate each user's public key. This work includes a comparative study between the DRA model and all existing solutions, as well as the modification made to this model, with an emphasis on the aspect of reliability in terms of security. This study presents a simulation to demonstrate the effectiveness of the modification made to the DRA model. The obtained results show that our model has a security advantage over the existing solution, so we made these changes to reinforce the security of the DRA model. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Diffie-Hellmann" title="Diffie-Hellmann">Diffie-Hellmann</a>, <a href="https://publications.waset.org/abstracts/search?q=DRA" title=" DRA"> DRA</a>, <a href="https://publications.waset.org/abstracts/search?q=RSA" title=" RSA"> RSA</a>, <a href="https://publications.waset.org/abstracts/search?q=advanced%20encryption%20standard" title=" advanced encryption standard"> advanced encryption standard</a> </p> <a href="https://publications.waset.org/abstracts/157930/the-effectiveness-of-a-hybrid-diffie-hellman-rsa-advanced-encryption-standard-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/157930.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">93</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2601</span> Microwave Security System in Museums: Design and Implementation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dalia%20Elsheakh">Dalia Elsheakh</a>, <a href="https://publications.waset.org/abstracts/search?q=Hala%20Elsadek"> Hala Elsadek</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The objective of this paper is to propose a competitive microwave security system that can be applied with reasonable price at museums in Egypt, considering the priceless elements in 23 Egyptian museums countrywide and the lack of good recent security systems even in big ones. The system main goal is to detect valuable targets to ensure their presence in the pre-defined positions in order to protect them from being stolen. The system is based on real time microwave scanning for the required space volume through transmitting RF waves at consecutive angles and detecting the back scattered waves from required objects to detect their existence at pre-specified locations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=microwave%20security%20system" title="microwave security system">microwave security system</a>, <a href="https://publications.waset.org/abstracts/search?q=object%20locating%20system" title=" object locating system"> object locating system</a>, <a href="https://publications.waset.org/abstracts/search?q=real%20time%20locating%20system%20%28RTLS%29" title=" real time locating system (RTLS)"> real time locating system (RTLS)</a>, <a href="https://publications.waset.org/abstracts/search?q=antenna%20array" title=" antenna array"> antenna array</a>, <a href="https://publications.waset.org/abstracts/search?q=array%20electronic%20scanning" title=" array electronic scanning"> array electronic scanning</a> </p> <a href="https://publications.waset.org/abstracts/5673/microwave-security-system-in-museums-design-and-implementation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/5673.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">349</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2600</span> An Examination of the Effects of Implantable Technologies on the Practices of Governmentality</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Benn%20Van%20Den%20Ende">Benn Van Den Ende</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Over the last three decades, there has been an exponential increase in developments in implantable technologies such as the cardiac pacemaker, bionic prosthesis, and implantable chips. The effect of these technologies has been well researched in many areas. However, there is a lack of critical research in security studies. This paper will provide preliminary findings to an ongoing research project which aims to examine how implantable technologies effect the practices of governmentality in the context of security. It will do this by looking at the practices and techniques of governmentality along with different implantable technologies which increase, change or otherwise affect governmental practices. The preliminary research demonstrates that implantable technologies have a profound effect on the practices of governmentality, while also paving the way for further research into a potential ‘new’ form of governmentality in relation to these implantable technologies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=critical%20security%20studies" title="critical security studies">critical security studies</a>, <a href="https://publications.waset.org/abstracts/search?q=governmentality" title=" governmentality"> governmentality</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20theory" title=" security theory"> security theory</a>, <a href="https://publications.waset.org/abstracts/search?q=political%20theory" title=" political theory"> political theory</a>, <a href="https://publications.waset.org/abstracts/search?q=Foucault" title=" Foucault "> Foucault </a> </p> <a href="https://publications.waset.org/abstracts/79464/an-examination-of-the-effects-of-implantable-technologies-on-the-practices-of-governmentality" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/79464.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">189</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2599</span> Integrated Water Resources Management to Ensure Water Security of Arial Khan River Catchment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abul%20Kalam%20Azad">Abul Kalam Azad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Water security has become an increasingly important issue both at the national and international levels. Bangladesh having an abundance of water during monsoon while the shortage of water during the dry season is far from being water secured. Though water security has been discussed discretely at a different level but a holistic effort to ensure water security is yet to be made. The elements of water security such as sectoral demands of water, conflicting requirements amongst the sectors, balancing between demand and supply including the quality of water can best be understood and managed in a catchment as it is the standard functioning unit. The Arial Khan River catchment consists of parts of Faridpur, Madaripur, Shariatpur and Barishal districts have all the components of water demands such as agriculture, domestic, commercial, industrial, forestry, fisheries, navigation or recreation and e-flow requirements. Based on secondary and primary data, water demands of various sectors have been determined. CROPWAT 8.0 has been used to determine the Agricultural Water Demand. Mean Annual Flow (MAF) and Flow Duration Curve (FDC) have been used to determine the e-flow requirements. Water Evaluation and Planning System (WEAP) based decision support tool as part of Integrated Water Resources Management (IWRM) has been utilized for ensuring the water security of the Arial Khan River catchment. Studies and practice around the globe connected with water security were consulted to mitigate the pressure on demand and supply including the options available to ensure the water security. Combining all the information, a framework for ensuring water security has been suggested for Arial Khan River catchment which can further be projected to river basin as well as for the country. This will assist planners and researchers to introduce the model for integrated water resources management of any catchment/river basins. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=water%20security" title="water security">water security</a>, <a href="https://publications.waset.org/abstracts/search?q=water%20demand" title=" water demand"> water demand</a>, <a href="https://publications.waset.org/abstracts/search?q=water%20supply" title=" water supply"> water supply</a>, <a href="https://publications.waset.org/abstracts/search?q=WEAP" title=" WEAP"> WEAP</a>, <a href="https://publications.waset.org/abstracts/search?q=CROPWAT" title=" CROPWAT"> CROPWAT</a> </p> <a href="https://publications.waset.org/abstracts/191697/integrated-water-resources-management-to-ensure-water-security-of-arial-khan-river-catchment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/191697.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">18</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2598</span> Harnessing Entrepreneurial Opportunities for National Security</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Itiola%20Kehinde%20Adeniran">Itiola Kehinde Adeniran</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper investigated the influence of harnessing entrepreneurial opportunities on the national security in Nigeria with a specific focus on the security situation of the post-amnesty programmes of the Federal Government in Ondo State. The self-administered structured questionnaire was employed to collect data from one hundred and twenty participants through purposive sampling method. Inferential statistics was used to analyze the data, specifically; ordinary least squares linear regression method was employed with the aid of statistical package for social science (SPSS) version 20 in order to determine the influence of independent variable (entrepreneurial opportunities) on dependent variable (national security). The result showed that business opportunities have a significant influence on the rate of criminal activities. The study also revealed that entrepreneurial opportunity creation and discovery as well as providing a model on how these entrepreneurial opportunities could be effectively and efficiently utilized jointly predict better national security, which counted for 69% variance of crime rate reduction. The paper, therefore, recommended that citizens should be encouraged to develop an interest in the skill-based activities in order to change their mindset towards self-employment which can motivate them in identify entrepreneurial opportunities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=entrepreneurship" title="entrepreneurship">entrepreneurship</a>, <a href="https://publications.waset.org/abstracts/search?q=entrepreneurial%20opportunities" title=" entrepreneurial opportunities"> entrepreneurial opportunities</a>, <a href="https://publications.waset.org/abstracts/search?q=national%20security" title=" national security"> national security</a>, <a href="https://publications.waset.org/abstracts/search?q=unemployment" title=" unemployment"> unemployment</a> </p> <a href="https://publications.waset.org/abstracts/34168/harnessing-entrepreneurial-opportunities-for-national-security" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/34168.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">330</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2597</span> The Adaptive Properties of the Strategic Assurance System of the National Economy Sustainability to the Economic Security Threats</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Badri%20Gechbaia">Badri Gechbaia</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Adaptive management as a fundamental element of the concept of the assurance of economy`s sustainability to the economic security of the system-synergetic type has been considered. It has been proved that the adaptive sustainable development is a transitional phase from the extensive one and later on from the rapid growth to the sustainable development. It has been determined that the adaptive system of the strategic assurance of the sustainability of the economy to the economic security threats is formed on the principles of the domination in its complex of the subsystems with weightier adaptive characteristics that negate the destructive influence of external and internal environmental factors on the sustainability of the national economy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=adaptive%20management" title="adaptive management">adaptive management</a>, <a href="https://publications.waset.org/abstracts/search?q=adaptive%20properties" title=" adaptive properties"> adaptive properties</a>, <a href="https://publications.waset.org/abstracts/search?q=economic%20security" title=" economic security"> economic security</a>, <a href="https://publications.waset.org/abstracts/search?q=strategic%20assurance" title=" strategic assurance "> strategic assurance </a> </p> <a href="https://publications.waset.org/abstracts/35350/the-adaptive-properties-of-the-strategic-assurance-system-of-the-national-economy-sustainability-to-the-economic-security-threats" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/35350.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">507</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2596</span> Defence Diplomacy and Collective Security in Africa: Case of Rwanda Defence Forces</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Emmanuel%20Mugiraneza">Emmanuel Mugiraneza</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Rwanda uses defence diplomacy to pursue international collective security through different mechanisms. This paper shows that with an intent of promoting international collective security, Rwanda has constituted its defense diplomacy policy in three standpoints. First, Rwanda has formed strategic cooperation alliances with state actors, regional and international Organizations that enables her to participate in and promote international collective peace, security and cooperation. Secondary, Rwanda uses defence diplomacy to foster cooperation in to pre-empt, minimize and neutralize potential triggers that would lead to the outbreak of international conflict. Thirdly, Rwanda implements defence diplomacy policy strategy through internationally recognized operational and tactical standards while dispelling hostilities, assisting the friendly nation’s forces and or building and maintaining public confidence and trust in the areas where Rwanda Defence Force deploys for peacekeeping missions in Sudan, South Sudan, Central African Republic and Mozambique for a counterterrorism mission. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=defence%20diplomacy" title="defence diplomacy">defence diplomacy</a>, <a href="https://publications.waset.org/abstracts/search?q=collective%20security" title=" collective security"> collective security</a>, <a href="https://publications.waset.org/abstracts/search?q=Rwanda" title=" Rwanda"> Rwanda</a>, <a href="https://publications.waset.org/abstracts/search?q=Peacekeeping" title=" Peacekeeping"> Peacekeeping</a> </p> <a href="https://publications.waset.org/abstracts/148483/defence-diplomacy-and-collective-security-in-africa-case-of-rwanda-defence-forces" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148483.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">123</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2595</span> Proposal of a Model Supporting Decision-Making on Information Security Risk Treatment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ritsuko%20Kawasaki">Ritsuko Kawasaki</a>, <a href="https://publications.waset.org/abstracts/search?q=Takeshi%20Hiromatsu"> Takeshi Hiromatsu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Management is required to understand all information security risks within an organization, and to make decisions on which information security risks should be treated in what level by allocating how much amount of cost. However, such decision-making is not usually easy, because various measures for risk treatment must be selected with the suitable application levels. In addition, some measures may have objectives conflicting with each other. It also makes the selection difficult. Therefore, this paper provides a model which supports the selection of measures by applying multi-objective analysis to find an optimal solution. Additionally, a list of measures is also provided to make the selection easier and more effective without any leakage of measures. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=information%20security%20risk%20treatment" title="information security risk treatment">information security risk treatment</a>, <a href="https://publications.waset.org/abstracts/search?q=selection%20of%20risk%20measures" title=" selection of risk measures"> selection of risk measures</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20acceptance" title=" risk acceptance"> risk acceptance</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-objective%20optimization" title=" multi-objective optimization"> multi-objective optimization</a> </p> <a href="https://publications.waset.org/abstracts/6491/proposal-of-a-model-supporting-decision-making-on-information-security-risk-treatment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/6491.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">379</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2594</span> Blockchain Technology Security Evaluation: Voting System Based on Blockchain</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Omid%20Amini">Omid Amini</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays, technology plays the most important role in the life of human beings because people use technology to share data and to communicate with each other, but the challenge is the security of this data. For instance, as more people turn to technology in the world, more data is generated, and more hackers try to steal or infiltrate data. In addition, the data is under the control of the central authority, which can trigger the challenge of losing information and changing information; this can create widespread anxiety for different people in different communities. In this paper, we sought to investigate Blockchain technology that can guarantee information security and eliminate the challenge of central authority access to information. Now a day, people are suffering from the current voting system. This means that the lack of transparency in the voting system is a big problem for society and the government in most countries, but blockchain technology can be the best alternative to the previous voting system methods because it removes the most important challenge for voting. According to the results, this research can be a good start to getting acquainted with this new technology, especially on the security part and familiarity with how to use a voting system based on blockchain in the world. At the end of this research, it is concluded that the use of blockchain technology can solve the major security problem and lead to a secure and transparent election. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain" title="blockchain">blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=information" title=" information"> information</a>, <a href="https://publications.waset.org/abstracts/search?q=voting%20system" title=" voting system"> voting system</a>, <a href="https://publications.waset.org/abstracts/search?q=transparency" title=" transparency"> transparency</a> </p> <a href="https://publications.waset.org/abstracts/162928/blockchain-technology-security-evaluation-voting-system-based-on-blockchain" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/162928.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">132</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2593</span> Radical Islam and Transnational Security: West Africa and the Asia Pacific in View</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Olumide%20A.%20Fafore">Olumide A. Fafore</a>, <a href="https://publications.waset.org/abstracts/search?q=Khondlo%20Mtshali"> Khondlo Mtshali</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The beginning of the 21st century saw the emergence of new and global threats to national and transnational security in West Africa and the Asia Pacific regions as a result of the spread of jihadist terrorism across borders, a manifestation of the rise of radical Islam. Extremist and armed Islamic movements influenced by Salafism, the Jihad in Afghanistan and the Muslim Brotherhood are prevalent in Northern Nigeria, Niger, Cameroon, Mali, Chad, Pakistan, Afghanistan, and India. Carrying out attacks across borders, including assassinations, murders, armed robberies, and kidnapping, assisted by open and porous borders and large flow of illegal immigrants across borders. This paper examines the effect of Radical Islam on Transnational security through a review of past literature and the social and security consequences on the people of the regions. Our findings indicate that the activities of armed Islamic movements such as Boko Haram, Ansaru and Al-Qaeda are having a negative impact on the economy, development, and security of the states and people of West Africa and the Asia Pacific. It stresses the importance of regional, transnational and international cooperation, as these threats to national and transnational security can no longer be solved in a national or regional framework. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Islamic%20movements" title="Islamic movements">Islamic movements</a>, <a href="https://publications.waset.org/abstracts/search?q=jihadist%20terrorism" title=" jihadist terrorism"> jihadist terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=radical%20Islam" title=" radical Islam"> radical Islam</a>, <a href="https://publications.waset.org/abstracts/search?q=transnational%20security" title=" transnational security"> transnational security</a> </p> <a href="https://publications.waset.org/abstracts/102740/radical-islam-and-transnational-security-west-africa-and-the-asia-pacific-in-view" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/102740.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">163</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2592</span> Assessment of Pastoralist-Crop Farmers Conflict and Food Security of Farming Households in Kwara State, Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=S.%20A.%20Salau">S. A. Salau</a>, <a href="https://publications.waset.org/abstracts/search?q=I.%20F.%20Ayanda"> I. F. Ayanda</a>, <a href="https://publications.waset.org/abstracts/search?q=I.%20Afe"> I. Afe</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20O.%20Adesina"> M. O. Adesina</a>, <a href="https://publications.waset.org/abstracts/search?q=N.%20B.%20Nofiu"> N. B. Nofiu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Food insecurity is still a critical challenge among rural and urban households in Nigeria. The country’s food insecurity situation became more pronounced due to frequent conflict between pastoralist and crop farmers. Thus, this study assesses pastoralist-crop farmers’ conflict and food security of farming households in Kwara state, Nigeria. The specific objectives are to measure the food security status of the respondents, quantify pastoralist- crop farmers’ conflict, determine the effect of pastoralist- crop farmers conflict on food security and describe the effective coping strategies adopted by the respondents to reduce the effect of food insecurity. A combination of purposive and simple random sampling techniques will be used to select 250 farming households for the study. The analytical tools include descriptive statistics, Likert-scale, logistic regression, and food security index. Using the food security index approach, the percentage of households that were food secure and insecure will be known. Pastoralist- crop farmers’ conflict will be measured empirically by quantifying loses due to the conflict. The logistic regression will indicate if pastoralist- crop farmers’ conflict is a critical determinant of food security among farming households in the study area. The coping strategies employed by the respondents in cushioning the effects of food insecurity will also be revealed. Empirical studies on the effect of pastoralist- crop farmers’ conflict on food security are rare in the literature. This study will quantify conflict and reveal the direction as well as the extent of the relationship between conflict and food security. It could contribute to the identification and formulation of strategies for the minimization of conflict among pastoralist and crop farmers in an attempt to reduce food insecurity. Moreover, this study could serve as valuable reference material for future researches and open up new areas for further researches. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=agriculture" title="agriculture">agriculture</a>, <a href="https://publications.waset.org/abstracts/search?q=conflict" title=" conflict"> conflict</a>, <a href="https://publications.waset.org/abstracts/search?q=coping%20strategies" title=" coping strategies"> coping strategies</a>, <a href="https://publications.waset.org/abstracts/search?q=food%20security" title=" food security"> food security</a>, <a href="https://publications.waset.org/abstracts/search?q=logistic%20regression" title=" logistic regression"> logistic regression</a> </p> <a href="https://publications.waset.org/abstracts/101154/assessment-of-pastoralist-crop-farmers-conflict-and-food-security-of-farming-households-in-kwara-state-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/101154.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">190</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2591</span> Security Risks Assessment: A Conceptualization and Extension of NFC Touch-And-Go Application </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ku%20Aina%20Afiqah%20Ku%20Adzman">Ku Aina Afiqah Ku Adzman</a>, <a href="https://publications.waset.org/abstracts/search?q=Manmeet%20Mahinderjit%20Singh"> Manmeet Mahinderjit Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Zarul%20Fitri%20Zaaba"> Zarul Fitri Zaaba</a> </p> <p class="card-text"><strong>Abstract:</strong></p> NFC operates on low-range 13.56 MHz frequency within a distance from 4cm to 10cm, and the applications can be categorized as touch and go, touch and confirm, touch and connect, and touch and explore. NFC applications are vulnerable to various security and privacy attacks such due to its physical nature; unprotected data stored in NFC tag and insecure communication between its applications. This paper aims to determine the likelihood of security risks happening in an NFC technology and application. We present an NFC technology taxonomy covering NFC standards, types of application and various security and privacy attack. Based on observations and the survey presented to evaluate the risk assessment within the touch and go application demonstrates two security attacks that are high risks namely data corruption and DOS attacks. After the risks are determined, risk countermeasures by using AHP is adopted. The guideline and solutions to these two high risks, attacks are later applied to a secure NFC-enabled Smartphone Attendance System. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Near%20Field%20Communication%20%28NFC%29" title="Near Field Communication (NFC)">Near Field Communication (NFC)</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20%20assessment" title=" risk assessment"> risk assessment</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-criteria%20decision%20making" title=" multi-criteria decision making"> multi-criteria decision making</a>, <a href="https://publications.waset.org/abstracts/search?q=Analytical%20Hierarchy%20Process%20%28AHP%29" title=" Analytical Hierarchy Process (AHP)"> Analytical Hierarchy Process (AHP)</a> </p> <a href="https://publications.waset.org/abstracts/66165/security-risks-assessment-a-conceptualization-and-extension-of-nfc-touch-and-go-application" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/66165.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">302</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2590</span> Social Security Reform and Management: The Case of Three Member Territories of the Organisation of Eastern Caribbean States</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cleopatra%20Gittens">Cleopatra Gittens</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It has been recognized that some social security and national insurance systems in the Eastern Caribbean are experiencing ageing populations and economic and other crises that will present a financial challenge of being unable to pay pension benefits in fifteen to twenty years. This has implications for the fiscal and economic positions of the countries themselves. Hence, organizations would need to address the issue urgently. The study adds to the body of knowledge on social security systems and social security reforms in small island developing states (SIDS). It also makes recommendations for the types of reforms that social security systems in other SIDS can implement given their special circumstances. Secondary research is used to gather financial and other related information on three social security schemes in the Eastern Caribbean. Actuarial and financial reports and other documents of the social security systems are analysed to obtain financial and static data on each of the schemes. The findings show that the three schemes studied are experiencing steady increases in benefit expenditure versus contributions and increasing pensioner to insured ratios. The schemes will deplete their reserves between 2038 and 2050. Two of the schemes have increased their retirement age while the other has not embarked on any reforms. One scheme has made changes to its contribution percentages. Due to their small size, small populations and other unique circumstances, the social security schemes in the identified territories are not likely to be able to take advantage of all of the reform initiatives that the developed world embarked on when faced with similar problems. These schemes will need to make incremental changes that align with the timeframes recommended by the actuarial studies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=benefits" title="benefits">benefits</a>, <a href="https://publications.waset.org/abstracts/search?q=pension" title=" pension"> pension</a>, <a href="https://publications.waset.org/abstracts/search?q=small%20island%20developing%20states" title=" small island developing states"> small island developing states</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20security%20reform" title=" social security reform"> social security reform</a> </p> <a href="https://publications.waset.org/abstracts/157584/social-security-reform-and-management-the-case-of-three-member-territories-of-the-organisation-of-eastern-caribbean-states" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/157584.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">91</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2589</span> Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Haydar%20Teymourlouei">Haydar Teymourlouei</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber-attacks" title="cyber-attacks">cyber-attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=home%20user" title=" home user"> home user</a>, <a href="https://publications.waset.org/abstracts/search?q=prevention" title=" prevention"> prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a> </p> <a href="https://publications.waset.org/abstracts/25329/quick-reference-cyber-attacks-awareness-and-prevention-method-for-home-users" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25329.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">393</span> </span> </div> </div> <ul class="pagination"> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security.&amp;page=6" rel="prev">&lsaquo;</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security.&amp;page=1">1</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security.&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security.&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security.&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security.&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security.&amp;page=6">6</a></li> <li class="page-item active"><span class="page-link">7</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security.&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security.&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security.&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security.&amp;page=93">93</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security.&amp;page=94">94</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security.&amp;page=8" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10