Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1361
Secure transmission scheme for millimeter-wave Internet of vehicles with multiple base stations and users
Published 2024-08-01Subjects: Get full text
Article -
1362
A Secure Privacy-Preserving Data Aggregation Model in Wearable Wireless Sensor Networks
Published 2015-01-01“…So, privacy preservation is becoming an increasingly important issue in security data aggregation. In this paper, we propose a security privacy-preserving data aggregation model, which adopts a mixed data aggregation structure. …”
Get full text
Article -
1363
Solvable constraints and unsolvable limits to global climate adaptation in coastal Indigenous food security
Published 2025-01-01Subjects: Get full text
Article -
1364
Design of the Monitoring System for Communication Satellite Information Security Based on Spaceborne Network Probe
Published 2023-06-01Subjects: Get full text
Article -
1365
DHRCA: A Design of Security Architecture Based on Dynamic Heterogeneous Redundant for System on Wafer
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
1366
Strong incidence domination in some operations of fuzzy incidence graphs and application in security allocation
Published 2024-12-01“…Additionally, the paper discusses an application of SID in security allocation.…”
Get full text
Article -
1367
-
1368
A social security bonus for a new start out of the mini-job crisis
Published 2021-10-01Get full text
Article -
1369
BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid
Published 2011-01-01“…BVS can achieve forward and backward security and only relies on hash functions. Security analysis justifies that the proposed schemes, especially BVS, can attain the security goals with low computation and storage cost.…”
Get full text
Article -
1370
Improved Population Intelligence Algorithm and BP Neural Network for Network Security Posture Prediction
Published 2023-01-01“…To address the problems of low prediction accuracy and slow convergence of the network security posture prediction model, a population intelligence optimization algorithm is proposed to improve the network security posture prediction model of the BP neural network. …”
Get full text
Article -
1371
Security versus reliability analysis for multi-eavesdropper cooperation wireless networks with best relay
Published 2017-10-01Subjects: “…physical-layer security…”
Get full text
Article -
1372
Retracted: Internet of Things Security Detection Technology Based on Grey Association Decision Algorithm
Published 2023-01-01Get full text
Article -
1373
Traffic-related air pollutants (TRAP) in relation to respiratory symptoms among security guards
Published 2025-01-01“…Occupational lung disease is a significant health concern in Malaysia, which, relatively little research on respiratory issues among Malaysian security personnel. The objective of this study is to evaluate the exposure level of TRAP PM2.5 and respiratory symptoms among security guards. …”
Get full text
Article -
1374
China-Pakistan Economic Corridor: Meeting Security Challenges in Balochistan Through Trade and Development
Published 2022-11-01Subjects: Get full text
Article -
1375
Measuring resilience properties of household livelihoods and food security outcomes in the risky environments of Ethiopia
Published 2018-11-01Subjects: Get full text
Article -
1376
Balancing on carbon storage and ecological security in urban areas: The case of Dongguan city, China
Published 2025-06-01Subjects: Get full text
Article -
1377
Data-driven modeling of background radiation structure utilizing matrix profile in nuclear security
Published 2025-01-01Subjects: Get full text
Article -
1378
Improve security monitoring knowledge management in IoT applications based on user behavior analysis
Published 2023-09-01“…Using the proposed method, users can transfer their data to IoT storage servers with more security than similar methods without knowing how and where to store it. …”
Get full text
Article -
1379
Secure Image Reconstruction using Deep Learning-based Autoencoder with Integrated Encryption Layers
Published 2024-12-01“… This study presents an autoencoder model designed for secure image reconstruction through the integration of encryption and decryption layers within its framework. …”
Get full text
Article -
1380
Federal Deep Learning Approach of Intrusion Detection System for In-Vehicle Communication Network Security
Published 2025-01-01“…CAN is susceptible to various network-level attacks due to the shortfall in security protocols. This article presents a new approach in addressing this challenge by introducing a unique intrusion detection system. …”
Get full text
Article