Suggested Topics within your search.
      
      Suggested Topics within your search.
      
        
    
                      
  
      
    - Security measures 6
 - Computer security 4
 - Computer networks 3
 - Economic aspects 3
 - Globalization 3
 - Management 3
 - Data protection 2
 - Economic conditions 2
 - Economic development 2
 - Economic policy 2
 - Handbooks, manuals, etc 2
 - Prevention 2
 - Technological innovations 2
 - Agricultural laws and legislation 1
 - Automobiles 1
 - BUSINESS & ECONOMICS / Development / Economic Development 1
 - BUSINESS & ECONOMICS / General 1
 - BUSINESS & ECONOMICS / International / Economics 1
 - Big data 1
 - Biotechnology 1
 - Bioterrorism 1
 - Brothers and sisters 1
 - Climate change mitigation 1
 - Cyberterrorism 1
 - Digital watermarking 1
 - Education 1
 - Elias (Fictitious character) 1
 - Ethnoscience 1
 - Family policy 1
 - Fantasy 1
 
- 
            1761
PROPOSAL FOR THE CREATION OF SECURITY PLANS FOR THE ROAD TRANSPORTATION OF HIGH CONSEQUENCE DANGEROUS GOODS
Published 2016-12-01Subjects: Get full text
Article - 
            1762
Investigating Security Awareness and Incident Reporting levels at Mbarara University of Science and Technology
Published 2024-10-01Subjects: Get full text
Article - 
            1763
On the issue of psychodiagnosis of Internet addiction against the background of social isolation and security crisis
Published 2023-09-01“…Aim: to analyze the diagnostic informativeness of the Kimberly Young’s Internet Addiction Test in the conditions of social isolation and security crisis in Ukraine. Materials and methods. …”
Get full text
Article - 
            1764
Privacy-preserving ADP for secure tracking control of AVRs against unreliable communication
Published 2025-01-01Get full text
Article - 
            1765
Assessment of energy security in West Africa: A case study of three countries
Published 2024-11-01Subjects: “…Energy security…”
Get full text
Article - 
            1766
Implementation of the Elliptic Curve Cryptography Method in Digital Image Security in Medical Images
Published 2024-12-01“… Digital security become increasingly important particularly in medical field as impact of patient privacy and the protection of patient data. …”
Get full text
Article - 
            1767
A High Abstract Digital Forensic Readiness Metamodel for Securing Smart Cities
Published 2024-01-01“…As a solution to this challenge, the present study developed a high abstract digital forensic readiness metamodel (HADFRM) for securing smart cities using a model-driven engineering approach. …”
Get full text
Article - 
            1768
Management of receivables and payables as an element of ensuring the economic security of an enterprise: practical aspects
Published 2023-02-01Subjects: Get full text
Article - 
            1769
Economic security as a driver of Russian exclave development in alignment with national interests
Published 2024-01-01Subjects: “…economic security…”
Get full text
Article - 
            1770
Securing Maritime Autonomous Surface Ships: Cyber Threat Scenarios and Testbed Validation
Published 2025-01-01Get full text
Article - 
            1771
An Analysis of the Impact of the Syrian Crisis on Turkey’s Politic-Military, Social and Economic Security
Published 2020-06-01Subjects: Get full text
Article - 
            1772
Research, development and capacity building for food and nutrition security in sub-Saharan Africa
Published 2020-10-01Subjects: Get full text
Article - 
            1773
Chosen-Ciphertext Secure Unidirectional Proxy Re-Encryption Based on Asymmetric Pairings
Published 2024-12-01Subjects: Get full text
Article - 
            1774
A Privacy-Preserving Secure Data Processing Scheme for the Internet of Medical Things
Published 2024-12-01“…This article introduces a secure data processing scheme for leveraging the IoMT application performance. …”
Get full text
Article - 
            1775
A network security situation prediction method based on hidden Markov model
Published 2015-12-01Subjects: “…network security situation prediction…”
Get full text
Article - 
            1776
Consequences of changing regional integration on environmental development, agricultural markets, and food security
Published 2023-10-01Subjects: Get full text
Article - 
            1777
Physical Mechanism Enabled Neural Network for Power System Dynamic Security Assessment
Published 2024-01-01Subjects: Get full text
Article - 
            1778
Modeling and verifying based on timed automata of Internet of things gateway security system
Published 2018-03-01Subjects: Get full text
Article - 
            1779
An Efficient Framework for Security of Internet-of-Things Devices against Malicious Software Updates
Published 2024-01-01“…The intelligent broker includes a secure software engine that integrates a disassembler, a preprocessor, and predictive models to detect malicious software. …”
Get full text
Article - 
            1780
Secure and verifiable outsourcing of determinant computing in the cloud and its electronic trading scheme
Published 2016-11-01“…In view of the problem that users’ informations are leaked and tampered possiblely exists at service terminal in existing outsourcing cloud computing protocols,a secure efficient and verifiable outsourcing protocol about determinant computing in the cloud was proposed.Firstly,the outsourcing computing protocol was based on the fuzz matrix technology and needed not under the premise of any difficulty assumptions to ensure the security of users’ informations.Secondly,by means of generating a special kind of transformation matrixes to deal with plaintext matrix,then after the users receive the returned results,the correctness of these results can be verified effectively,and the performance analysis shows this protocol can effectively improve the efficiency of outsourcing cloud computing.Finally,an electronic trading framework for determinant outsourcing computing was proposed,which could be effectively applied to e-commerce and other fields.…”
Get full text
Article