Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
901
Political Framework and Legal Basis of the EU-Russia Security Co-Operation
Published 2012-04-01Get full text
Article -
902
Secure Pesticide Storage: Using and Managing a Pesticide Storage Facility
Published 2004-10-01“…Revised: November 2004. PI33/PI068: Secure Pesticide Storage: General Features (ufl.edu) …”
Get full text
Article -
903
Research on IoT security situation awareness method based on evidence theory
Published 2022-04-01Subjects: Get full text
Article -
904
A certificateless aggregate signature scheme for security and privacy protection in VANET
Published 2022-05-01“…Unfortunately, some of them still have some security and privacy issues under specific existing attacks. …”
Get full text
Article -
905
Inter-domain routing security mechanism for crossing autonomous system alliance
Published 2014-10-01“…Through studying and analyzing SE-BGP (security enhanced BGP),it was found that it couldn’t validate the cross-alliance AS (autonomous system) and defense the self-launched active attack.To solve the security problems,two-layer cross-alliance hierarchical structure CAHS (cross-alliance hierarchical structure) was designed.Based on CAHS,using the idea of passport visa and the features of AdHASH (additive hash),a cross-alliance BGP security mechanism SCA-BGP (secure crossing alliance for BGP) was proposed.The mechanism has higher security,which is able to effectively validate the identities and behavior authorization of the cross-alliance AS as well as the message carried by them.The experiment results show that SCA-BGP can effectively reduce the certificate scale and extra time overhead to get better scalability and convergence performance.…”
Get full text
Article -
906
Methodology for determining actual threats to information security in medical information system
Published 2021-11-01“…Its use also makes it possible to assess the relevance of information security threats for MIS that do not have qualified specialists in the field of information security in the staff of a medical institution, which is relevant for a large number of medical institutions. …”
Get full text
Article -
907
Low-Cost and Secure Communication System for SCADA System of Remote Microgrids
Published 2019-01-01“…Renewable energy-based local microgrids are gaining popularity despite the unavailability of low-cost, power efficient, and secure communication system for its supervisory control and data acquisition (SCADA) system. …”
Get full text
Article -
908
Theoretical and methodological approaches to the study of interregional interactions in ensuring economic security
Published 2022-07-01Subjects: Get full text
Article -
909
Elucidation of Public Welfare and Social Security Policies in Facing Global Challenges
Published 2023-02-01Subjects: Get full text
Article -
910
Quantum Algorithms for the Physical Layer: Potential Applications to Physical Layer Security
Published 2025-01-01Subjects: Get full text
Article -
911
The Threat from European Missile Defence System to Russian National Security
Published 2014-02-01Get full text
Article -
912
A Novel Computer Virus Propagation Model under Security Classification
Published 2017-01-01“…In reality, some computers have specific security classification. For the sake of safety and cost, the security level of computers will be upgraded with increasing of threats in networks. …”
Get full text
Article -
913
Strategic Nuclear and Non-Nuclear Deterrence in Russia’s National Security Policy
Published 2025-02-01Subjects: Get full text
Article -
914
Factors of geography and security in the integration construction: the case of East- Asian integration
Published 2012-12-01“…The paper analyzes the impact of geography and security threats on the dynamics and forms of integration cooperation in the area of East Asia. …”
Get full text
Article -
915
Secure Pesticide Storage: Workspace Features of a Pesticide Storage Facility
Published 2004-10-01“… This document identifies and discusses three key features of a pesticide storage facility's interior that, in combination, promote both worker safety and pesticide container security. This document is Fact Sheet PI-31, part of a series from the Pesticide Information Office, Food Science and Human Nutrition Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
Get full text
Article -
916
Security analysis of weighted network anonymity based on singular value decomposition
Published 2018-05-01“…The security of anonymous method based on singular value decomposition (SVD) in the privacy preserving of weighted social network was analyzed.The reconstruction method in network with integer weights and the inexact reconstruction method in network with arbitrary weighted were proposed.The <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mi>ε</mi> <mi>N</mi> </mfrac> </math></inline-formula> -tolerance was definited to measure its safety.It was also pointed out that the upper bound of ε (the reconfigurable coefficient) obtained in current spectral theories was so conservative that lacks of guidance.The reconfigurable coefficients of random networks,Barabasi-Albert networks,small world networks and real networks were calculated by experiment.Moreover,the reconfigurable coefficients of double perturbation strategies based on SVD were also tested.Experimental results show that weighted social networks have different tolerances on spectrum loss,and there is a close relationship between its tolerance and network parameters.…”
Get full text
Article -
917
End-to-End Security Mechanism Using Blockchain for Industrial Internet of Things
Published 2025-01-01Subjects: Get full text
Article -
918
Editorial: Artificial Intelligence-based Security Applications and Services for Smart Cities
Published 2024-08-01Get full text
Article -
919
An Automated Compliance Framework for Critical Infrastructure Security Through Artificial Intelligence
Published 2025-01-01Get full text
Article -
920
CLIMATE CHANGE AND LAND-BASED CONFLICT: THE IMPACT ON FOOD SECURITY IN NIGERIA
Published 2022-05-01Subjects: Get full text
Article