Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
901
Climate variability, population growth, and globalization impacting food security in Pakistan
Published 2025-02-01Subjects: Get full text
Article -
902
Efficient and provably secure attribute-based online/offline encryption schemes
Published 2014-07-01Subjects: Get full text
Article -
903
Young people’s participation in the recruitment and selection process for secure care staff
Published 2007-03-01Article -
904
Secure localization scheme against wormhole attack for wireless sensor networks
Published 2015-03-01Subjects: Get full text
Article -
905
Perception technology of virtual threat for large enterprise's information security construction
Published 2016-12-01Subjects: “…information security…”
Get full text
Article -
906
The security system of the Republic of Serbia: The character and value of knowledge in its products
Published 2024-01-01Subjects: “…security system…”
Get full text
Article -
907
AGRICULTURE AS A UNIFER OF SECURITY AND DEVELOPMENT IN THE FACE OF FREE MARKET CHALLENGES
Published 2024-12-01Subjects: “…security…”
Get full text
Article -
908
Research on professional learning margin of university information security teachers in China
Published 2017-07-01Subjects: “…information security…”
Get full text
Article -
909
New thoughts on security technologies for space-ground integration information network
Published 2017-12-01Subjects: Get full text
Article -
910
Provably secure private key protection scheme for smart mobile terminal
Published 2012-12-01Subjects: Get full text
Article -
911
Network security threat warning method based on qualitative differential game
Published 2018-08-01Subjects: “…network security threat…”
Get full text
Article -
912
Political Framework and Legal Basis of the EU-Russia Security Co-Operation
Published 2012-04-01Get full text
Article -
913
Secure Pesticide Storage: Using and Managing a Pesticide Storage Facility
Published 2004-10-01“…Revised: November 2004. PI33/PI068: Secure Pesticide Storage: General Features (ufl.edu) …”
Get full text
Article -
914
Research on IoT security situation awareness method based on evidence theory
Published 2022-04-01Subjects: Get full text
Article -
915
A certificateless aggregate signature scheme for security and privacy protection in VANET
Published 2022-05-01“…Unfortunately, some of them still have some security and privacy issues under specific existing attacks. …”
Get full text
Article -
916
Inter-domain routing security mechanism for crossing autonomous system alliance
Published 2014-10-01“…Through studying and analyzing SE-BGP (security enhanced BGP),it was found that it couldn’t validate the cross-alliance AS (autonomous system) and defense the self-launched active attack.To solve the security problems,two-layer cross-alliance hierarchical structure CAHS (cross-alliance hierarchical structure) was designed.Based on CAHS,using the idea of passport visa and the features of AdHASH (additive hash),a cross-alliance BGP security mechanism SCA-BGP (secure crossing alliance for BGP) was proposed.The mechanism has higher security,which is able to effectively validate the identities and behavior authorization of the cross-alliance AS as well as the message carried by them.The experiment results show that SCA-BGP can effectively reduce the certificate scale and extra time overhead to get better scalability and convergence performance.…”
Get full text
Article -
917
Methodology for determining actual threats to information security in medical information system
Published 2021-11-01“…Its use also makes it possible to assess the relevance of information security threats for MIS that do not have qualified specialists in the field of information security in the staff of a medical institution, which is relevant for a large number of medical institutions. …”
Get full text
Article -
918
Low-Cost and Secure Communication System for SCADA System of Remote Microgrids
Published 2019-01-01“…Renewable energy-based local microgrids are gaining popularity despite the unavailability of low-cost, power efficient, and secure communication system for its supervisory control and data acquisition (SCADA) system. …”
Get full text
Article -
919
Theoretical and methodological approaches to the study of interregional interactions in ensuring economic security
Published 2022-07-01Subjects: Get full text
Article -
920
Elucidation of Public Welfare and Social Security Policies in Facing Global Challenges
Published 2023-02-01Subjects: Get full text
Article