Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
521
Security flaws and improvement to a wireless authentication protocol with anonymity
Published 2006-01-01Subjects: Get full text
Article -
522
Secure control plane for SDN using Bayesian Stackelberg games
Published 2017-11-01Subjects: Get full text
Article -
523
A robust scheme for securing relational data incremental watermarking
Published 2025-06-01Subjects: Get full text
Article -
524
Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks
Published 2013-10-01Get full text
Article -
525
CYCLIC SYSTEM FOR TRAINING SPECIALISTS OF ECONOMIC SECURITY OF ENTERPRISES AND ORGANIZATIONS
Published 2020-09-01Subjects: Get full text
Article -
526
Efficient and provably-secure certificateless sequential aggregate signature scheme
Published 2022-05-01Get full text
Article -
527
Characteristics of security risks of large industrial investments and their management principles
Published 2025-01-01Subjects: “…Industrial investment, risk assessment, asset security, data protection…”
Get full text
Article -
528
Secure federated learning scheme based on adaptive Byzantine defense
Published 2024-08-01Subjects: Get full text
Article -
529
Analysis on Potential Network Security Risk of LTE Scalable Deployment
Published 2015-12-01Subjects: Get full text
Article -
530
Implementasi Mekanisme End-To-End Security pada IoT Middleware
Published 2019-05-01“…The results show both mechanisms can securely communication between middleware and other parties, but AES-CBS can only secure data payload, not entire data. …”
Get full text
Article -
531
ISSUES OF ENSURING ECONOMIC AND ENERGY SECURITY IN THE “SMART CITY” SYSTEM
Published 2020-09-01Subjects: Get full text
Article -
532
Research on backup and remapping of network slice based on security classification
Published 2018-11-01“…In the future virtual environment of 5G core network,the general X86 servers make the attackers exploit vulnerabilities more easily,the substrate network is infected with and spreads the virus more easily,and the problem of single physical node failed will affect the service performance of the network slice seriously.Based on the existing node backup and remapping solutions,considering the impact of security constraints among nodes on network security performance,a security parameter evaluation model of virtual nodes and physical nodes were proposed in the network slicing,and the security constraint relationship was established between the virtual nodes and the physical nodes.Then backup virtual nodes were selected based on the security parameters evaluation model,and backup mapping methods were designed.Finally,the node remapping mechanism was designed with satisfying the requirement of network delay.Experiments show that the proposed method can significantly improve network intrusion tolerance with satisfying the requirements of network slicing service performance.…”
Get full text
Article -
533
Contribution of Russia to regional cooperation in the sphere of security in Central Asia
Published 2010-04-01Get full text
Article -
534
Network security situational awareness model based on threat intelligence
Published 2021-06-01Subjects: Get full text
Article -
535
Smart contract-based secure cooperative spectrum sensing algorithm
Published 2021-12-01“…With simulations, we prove that the algorithm proposed in this article increases the accuracy and security of spectrum sensing and can effectively resist SSDF attack.…”
Get full text
Article -
536
A security authentication scheme in RFID system for smart park
Published 2016-02-01“…The new protocol could effectively resist attacks of re-transmission,tracking,deception,cloning and de-synchronizationand,and it had high security and practicability.…”
Get full text
Article -
537
QUALITATIVE CHANGES IN JAPAN’S POLICY IN THE FIELD OF MILITARY SECURITY IN 2013
Published 2013-10-01“…The article deals with the qualitative changes that have taken place in the course of Japan in the field of military security in December 2012 after the rise of the second Abe Cabinet. …”
Get full text
Article -
538
Indoor Vertical Farming Systems for Food Security and Resource Sustainability
Published 2020-04-01“…Learn about the limitations and challenges of the industry as well as the potential benefits both for food security and resource sustainability. https://edis.ifas.ufl.edu/fr429 …”
Get full text
Article -
539
Physical layer security of MIMO wireless systems with adaptive modulation
Published 2023-07-01Subjects: Get full text
Article -
540
Dual-verified secure localization method for unmanned intelligent vehicles
Published 2024-06-01“…To address this problem, a dual-verified secure localization method for unmanned intelligent vehicles was proposed. …”
Get full text
Article