Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1161
Evaluation on Security of Water Resources in Shiyan City Based on Water Poverty Index
Published 2020-01-01Subjects: Get full text
Article -
1162
Inter-Cloud Data Security Framework to Build Trust Based on Compliance with Controls
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
1163
Federated Reinforcement Learning in Stock Trading Execution: The FPPO Algorithm for Information Security
Published 2025-01-01Get full text
Article -
1164
Dual-Mode Encryption for UC-Secure String OT from Learning with Errors
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
1165
5G Networks Security Mitigation Model: An ANN-ISM Hybrid Approach
Published 2025-01-01Subjects: Get full text
Article -
1166
Gazprom on the European Market: In Search of the Balance between the Principles of Competition and Energy Security
Published 2014-08-01Subjects: Get full text
Article -
1167
Performance optimization of physical layer security in STAR-RIS aided NOMA system
Published 2024-05-01Subjects: Get full text
Article -
1168
Security Challenges: Appraisal of Threats to Nigeria’s Sovereignty in the Fourth Republic (1999-2019)
Published 2023-07-01Subjects: Get full text
Article -
1169
Assessing the impact of the country’s economic security on export development in the agro-industrial sector
Published 2022-05-01Subjects: Get full text
Article -
1170
Research on critical SNR and power allocation of artificial noise assisted secure transmission
Published 2019-06-01Subjects: “…physical layer security…”
Get full text
Article -
1171
Security communication and energy efficiency optimization strategy in UAV-aided edge computing
Published 2023-03-01Subjects: Get full text
Article -
1172
Protection and Control of the State Border as a Component of Ensuring National Security of Ukraine
Published 2019-09-01Subjects: Get full text
Article -
1173
Adaptive federated learning secure aggregation scheme based on threshold homomorphic encryption
Published 2023-07-01Subjects: Get full text
Article -
1174
Open platform and key technology of mobile application security depth detection capability
Published 2018-03-01Subjects: “…mobile application security…”
Get full text
Article -
1175
Verifiably secure fast group authentication protocol with anonymous traceability for Internet of vehicles
Published 2021-06-01“…Identity authentication is the first line of defense for vehicles to access IoV (Internet of vehicles).However, the existing schemes cannot meet the requirements of efficient authentication of IoV well, nor can they realize fast anonymous traceability.In view of this, a bidirectional anonymous traceability group authentication protocol was proposed in IoV.In this protocol, a number of RSU (road side unit) were grouped quickly and dynamically.And the vehicles entering the RSU group were authenticated with the one-way trap gating property and semi-group property of Chebyshev chaotic map.When the vehicle switched between the RSU within a group, the reverse hash chain was used for fast handover authentication.In addition, the RSU within a group can trace anonymously and revoke the identity of malicious vehicles quickly by using blockchain, and can also freely change the ID of users who reveal their real identity.At the same time, the semantic security of the proposed protocol is proved by using the random predictor model.Finally, simulation results show the proposed scheme has good security and effectiveness.…”
Get full text
Article -
1176
One Year after the Crisis in the Caucasus: Some Рroblems of the European Security
Published 2009-10-01Get full text
Article -
1177
Evolution game model of offense-defense for network security based on system dynamics
Published 2014-01-01Subjects: “…information security…”
Get full text
Article -
1178
Self-corrected coefficient smoothing method based network security situation prediction
Published 2020-05-01Subjects: “…security situation…”
Get full text
Article -
1179
Reference architecture of the telecom network security protection system for cloud network convergence
Published 2020-05-01Subjects: Get full text
Article -
1180
Application of human-in-the-loop hybrid augmented intelligence approach in security inspection system
Published 2025-01-01Subjects: Get full text
Article