Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1521
Food security and dietary intake of a cohort of South African students during COVID-19
Published 2025-01-01Subjects: Get full text
Article -
1522
Memahami Dinamika Kerjasama Industri Pertahanan dalam Kerangka Indonesia Australia Defence Security Dialogue
Published 2023-01-01“…Industri pertahanan menjadi salah satu agenda penting dan menjadi perhatian, dimulai pada saat kabinet Indonesia Bersatu I dibawah Presiden Susilo Bambang Yudhoyono dan menjadikannya sebagai prioritas pembangunan dan memberi peluang besar bagi keterlibatan pihak swasta dalam kegiatan industri pertahanan salah satunya melalui agenda kerja sama yang dijalin oleh Indonesia dengan Australia dalam satu agenda dialog Indonesia – Australia Defense Security Dialogue (IADSD) yang telah dijalin dan disahkan oleh Lombok Treaty pada tahun 2006, yang mana Indonesia dalam hal ini memiliki kepentingan untuk meningkatkan kapabilitas serta kemandirian Industri pertahanan nasional. …”
Get full text
Article -
1523
Secure and efficient batch authentication scheme based on dynamic revocation mechanism in space information network
Published 2022-04-01“…A secure and efficient batch authentication scheme based on dynamic revocation mechanism was proposed for the problem of cross-domain authentication of a large number of mobile users in space information networks.Early key negotiation was achieved by predicting the satellite trajectory and updating the session key in real time.Algorithms were designed for a single as well as a large number of mobile terminals to perform signing and verification, which effectively reduce the computational burden of satellites.Cuckoo filters were adopted by the new scheme to achieve dynamic revocation and malicious access control of mobile terminals.Finally, under the Diffie-Hellman assumption, the proposed scheme was proved to be resistant to replay and man-in-the-middle attacks based on a random oracle model and automated validation of internet security protocols and applications.Security goals such as traceability and revocability were achieved by the scheme, thus improving the efficiency of transmission and computation by more than 80% and 20%, respectively, compared with the existing optimal scheme.…”
Get full text
Article -
1524
Security and religion in democratizing Tunisia: re-enacting surveillance through religious narratives and gendered dynamics
Published 2024-07-01Subjects: Get full text
Article -
1525
SECURITY, POLITICS, AND THE CIRCULAR ECONOMY: A HISTORICAL STUDY OF ROMANIA’S RAILWAY EVOLUTION (1846-2007)
Published 2024-12-01Subjects: Get full text
Article -
1526
A Topology Visualization Early Warning Distribution Algorithm for Large-Scale Network Security Incidents
Published 2013-01-01“…It is of great significance to research the early warning system for large-scale network security incidents. It can improve the network system’s emergency response capabilities, alleviate the cyber attacks’ damage, and strengthen the system’s counterattack ability. …”
Get full text
Article -
1527
A security detection approach based on autonomy-oriented user sensor in social recommendation network
Published 2022-03-01“…However, the characteristic of openness brings great hidden dangers to the security of recommender systems. Shilling attackers can change the recommendations by foraging user relationships. …”
Get full text
Article -
1528
Assessing Structural Components of Investment and Innovation Provision of Economic Security in the Basic Types of Economic Activity
Published 2021-06-01“…The article shows the progressive and practical value of a structural approach to the evaluation of investment and innovation provision of economic security, including the basic types of economic activity. …”
Get full text
Article -
1529
Towards the Integration between IoT and Cloud Computing: An Approach for the Secure Self-Configuration of Embedded Devices
Published 2015-12-01“…The secure boot-up and setup of Internet of Things (IoT) devices connected over the Cloud represent a challenging open issue. …”
Get full text
Article -
1530
Resource allocation algorithm for secure communication in UAV-assisted D2D communication network
Published 2024-02-01Subjects: Get full text
Article -
1531
Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique
Published 2016-01-01“…The data which is stored in the cloud can be sensitive and at times needs a proper file storage system with a tough security algorithm. Whereas cloud is an open shareable elastic environment, it needs impenetrable and airtight security. …”
Get full text
Article -
1532
-
1533
-
1534
Research on energy-efficient physical-layer secure transmission mechanism in decode-and-forward cooperative networks
Published 2017-01-01Subjects: Get full text
Article -
1535
Personal data security as a form of legal certainty for the fulfillment of consumer rights for online loans
Published 2024-10-01Subjects: “…personal data security, online lending, consumer protection, financial services authority, legal certainty…”
Get full text
Article -
1536
Farmers-Herders Conflict and Nigeria’s Quest for Food Security: The Imperative Need for Information Communications Technology
Published 2021-12-01“…In recent times, many scholarly studies and inquiries on the impact of Information Communications Technology, particularly with respect to promoting food security in Nigeria, have been engendered mainly by the need to ensure greater agricultural outputs among farmers and other agriculturists. …”
Get full text
Article -
1537
Mitigating Software Vulnerabilities through Secure Software Development with a Policy-Driven Waterfall Model
Published 2024-01-01“…For the past few years, software security has become a pressing issue that needs to be addressed during software development. …”
Get full text
Article -
1538
-
1539
Smart Geopolitics, Dangerous Ideas: Energy security, Ideology, and the Challenges of American Policy in the Persian Gulf
Published 2016-08-01Subjects: Get full text
Article -
1540