Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1541
Conditioned secure access control model based on multi-weighted roles and rules in workflow system
Published 2008-01-01“…The traditional RBAC model cannot express complicated workflow secure access control constraint, so a new conditioned RBAC model suit for WfMS (workflow management system)—CMWRRBSAC (conditioned multi-weighted role and rule based secure access control model) was proposed on the basis of multi-weighted roles and rules. …”
Get full text
Article -
1542
Optimal Joint Defense and Monitoring for Networks Security under Uncertainty: A POMDP-Based Approach
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
1543
-
1544
Bioinspired Blockchain Framework for Secure and Scalable Wireless Sensor Network Integration in Fog–Cloud Ecosystems
Published 2024-12-01Subjects: Get full text
Article -
1545
A study on the impact of accounting information security controls on the effectiveness of internal controls in Vietnamese enterprises
Published 2025-03-01Subjects: “…Accounting information security…”
Get full text
Article -
1546
Investigation,analysis and improvement mentality of the revision on information security’s training program to undergraduates in Hunan University
Published 2020-08-01Subjects: Get full text
Article -
1547
Water insecurity is human: why social science must be at the core of water security research and practice
Published 2025-01-01“…To address this, the emerging science of water security can build on well-established and theoretically-robust findings from social science. …”
Get full text
Article -
1548
Assessing the role of local councils in the development of sustainable urban security (Case Study; Urmia City)
Published 2023-06-01“…Conclusions: Based on the Friedman test, among the research items, the second item is "Social Security Development", and the first item is "Economic Security Development". …”
Get full text
Article -
1549
A Novel Approach Based on Machine Learning, Blockchain, and Decision Process for Securing Smart Grid
Published 2024-01-01“…This paper presents a new approach that integrates Machine Learning (ML), Blockchain Technology (BT), and Markov Decision Process (MDP) to improve the security of SG networks while ensuring accurate storage of events reported by various network devices through BT. …”
Get full text
Article -
1550
Research on the anti-synchronization chaos system group &large scale distributed system security communication
Published 2017-07-01Subjects: “…secure communication…”
Get full text
Article -
1551
The role of international support programmes in global health security capacity building: A scoping review.
Published 2023-01-01“…Large scale public health emergencies such as COVID-19 demonstrate the importance of Global Health Security (GHS) and highlight the necessity of resilient public health systems capable of preparing for, detecting, managing, and recovering from such emergencies. …”
Get full text
Article -
1552
Solution of secure multi-party multi-data raking problem based on El Gamal encryption
Published 2007-01-01Subjects: “…secure multi-party multi-data rank…”
Get full text
Article -
1553
Network security threat prevention and control system of electric power monitoring systems for wind farm
Published 2020-05-01Subjects: Get full text
Article -
1554
THE RELATIONSHIP OF WOMEN WORKERS WITH DEVELOPMENT FROM THE PERSPECTIVE OF GAINING THEIR ECONOMIC FREEDOM AND SECURING THE FUTURE OF THEIR CHILDREN
Published 2023-03-01“…According to the results of the research, it has been detected that the participating women workers entered business life due to compulsory reasons, gained their economic freedom and stood on their own feet, it was effective that they worked to secure the future of their children and earned money, that they loved their job very much and were satisfied with their work. …”
Get full text
Article -
1555
Communication and Sensing: Wireless PHY-Layer Threats to Security and Privacy for IoT Systems and Possible Countermeasures
Published 2025-01-01Subjects: Get full text
Article -
1556
GEOPOLITICAL VARIATION IN THE REPORTAGE OF SECURITY BY THE NATION AND DAILY TRUST NEWSPAPERS (2010-2020): A PROGNOSIS
Published 2024-07-01Subjects: Get full text
Article -
1557
Enhanced airport security screening under fermatean probabilistic hesitant fuzzy hybrid aggregation information
Published 2024-06-01“…Optimizing airport security screening processes is imperative in the modern age, ensuring a delicate balance between stringent security measures and efficient, seamless travel experiences for passengers. …”
Get full text
Article -
1558
Introduction of the Project “Community Police Officer” as a Step towards Strengthening Local Security Infrastructure
Published 2020-02-01Subjects: Get full text
Article -
1559
Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks
Published 2014-01-01“…In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. …”
Get full text
Article -
1560
Robust chance-constrained optimization algorithm design for secure wireless powered backscatter communication system
Published 2021-03-01Subjects: Get full text
Article