Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1061
A distributed data secure transmission scheme in wireless sensor network
Published 2017-04-01“…Therefore, it is difficult to ensure security of broadcasting data transferred from a single wireless sensor node to base station. …”
Get full text
Article -
1062
An endogenous safety and security technical framework inspired by biological immune system
Published 2021-03-01Subjects: “…endogenous safety and security…”
Get full text
Article -
1063
An Investigation into Information Security Managerial Practices in Selected Public Sector Organizations.
Published 2023“…The study aims to examine information security managerial practices in organisations. It was guided by three specific objectives: identification of information security practices critical to information assets management; establishment of implementation processes involved in the execution of structured information security governance; and evaluation of policies that influence information security best practices. …”
Get full text
Article -
1064
THE SELECTION OF SMALL AND MEDIUM CAPITALIZATION ANALYSIS METHODS APPLIED IN INVESTOR PORTFOLIO FORMATION
Published 2016-10-01Subjects: “…analysis securities of small and medium capitalization…”
Get full text
Article -
1065
The features’ analysis of modern economic crises
Published 2023-06-01Subjects: Get full text
Article -
1066
On the risks of secure attachment in infancy: Childhood irritability and adolescent depression predicted by secure attachment and high approach behaviours at 14-months towards a caregiver living with inter-parental violence
Published 2023-04-01“…IntroductionThe secure infant turns to a caregiver for comfort when distressed or threatened. …”
Get full text
Article -
1067
Private Cloud Assistant Trust Model for P2P Secure Transactions
Published 2015-01-01“…Secure transactions among P2P peers are critical for system stability. …”
Get full text
Article -
1068
Research and practice of network security threat intelligence management system for power enterprise
Published 2022-07-01Subjects: “…network security…”
Get full text
Article -
1069
Adaptive Security Solutions for NOMA Networks: The Role of DDPG and RIS-Equipped UAVs
Published 2024-11-01Subjects: “…non-orthogonal multiple access, reconfigurable intelligent surface, unmanned aerial vehicles, deep reinforcement learning, deep deterministic policy gradient, physical layer security.…”
Get full text
Article -
1070
Improving Network Security: An Intelligent IDS with RNN-LSTM and Grey Wolf Optimization
Published 2024-12-01“…The architecture of this RNN-LSTM with GWO IDS provides capable and responsive intrusion detection, training on previous data to be able to detect new threats. Made for network security by combining deep learning and optimization, tests reached 99.5% accurate. …”
Get full text
Article -
1071
A Secure and Green Cognitive Routing Protocol for Wireless Ad-Hoc Networks
Published 2024-01-01“…The COG Protocol offers green and secure routing based on cognitive elementary memory intelligence, making it highly suitable for energy-efficient and secure wireless ad hoc networks.…”
Get full text
Article -
1072
Secure resource allocation in hybrid energy-harvesting relay and full-duplex receiver
Published 2019-01-01Subjects: “…physical layer security…”
Get full text
Article -
1073
Secure UAV-Based System to Detect Small Boats Using Neural Networks
Published 2019-01-01“…Given the high sensitivity of the managed information, the proposed system includes cryptographic protocols to protect the security of communications.…”
Get full text
Article -
1074
Research on consistency protection mechanism for secure states of virtual domain in cloud environment
Published 2016-10-01“…The traditional trusted computing architecture was suffering from the cloud uncertainty and dynamics caused by VM rollback or migration,which was a fatal threat to the cloud security.following investigations were conducted.Secure cloud virtual domain basic architecture; Time state consistence and collection mechanism.Cyber state consistence and collection mechanism.This study guaranteed security state consistence of virtual domain and improved the security and efficiency of the online service platform for both government institutions and companies.…”
Get full text
Article -
1075
INTERNAL CONTROL AS A TOOL OF SUPPORT ECONOMIC SECURITY OF THE ORGANIZATION AT THE MICRO LEVEL
Published 2021-04-01Subjects: Get full text
Article -
1076
RETRACTED: Improving the country’s food security in the conditions of developing a circular economy
Published 2024-01-01Get full text
Article -
1077
New kind of CD-DCSK chaos shift keying secure communication system
Published 2012-05-01“…As existing chaos keying communication systems had the issues of low data transmission rate and weak system confidentiality,a new kind of chaos shift keying communication system:CD-DCSK(correlation delay-differential chaos shift keying) was presented.At the same time lucubrated and simulated the communication performances of this new system.The theoretical deduction and emulational experimentation analysis verified that CD-DCSK has both merits of high confidentiality of CDSK and low BER of DCSK,and its transmission rate is twice as much as original shift keying schemes.Meanwhile,this new communication scheme perfectly achieved the secrecy transmission of age signal.Therefore,it can be clearly seen that this new system is realizable and has high security.…”
Get full text
Article -
1078
Analysis on Mobile Internet Application Security Issues Based on the Cloud Computing Mode
Published 2013-03-01Subjects: Get full text
Article -
1079
Advanced Approach to Information Security Management System Model for Industrial Control System
Published 2014-01-01“…Therefore, a new information security management system based on confidentiality, integrity, and availability as well as safety is required for ICSs. …”
Get full text
Article -
1080
Research on multi-party security collaborative linear regression for computing power networks
Published 2024-08-01Subjects: Get full text
Article