Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1021
Risk assessment and prevention in airport security assurance by integrating LSTM algorithm.
Published 2025-01-01“…It monitored the airport security situation in real-time based on the results and quickly notified airport security personnel to handle it. …”
Get full text
Article -
1022
Dynamic security-empowering architecture for space-ground integration information network
Published 2021-09-01Subjects: Get full text
Article -
1023
Hunger Solution: One-Dimensional and Multi-Dimensional Food Security Programs
Published 2018-12-01Subjects: Get full text
Article -
1024
The role of digital health in pandemic preparedness and response: securing global health?
Published 2024-12-01“…Background Digital health technologies, such as mobile applications, wearable devices, and electronic health record systems, have significantly enhanced global health security by enabling timely data collection and analysis, identifying infectious disease trends, and reducing infection risk through remote services. …”
Get full text
Article -
1025
Analyzing and Choosing the Appropriate Model for Issuing Islamic Securities for Financing SMEs
Published 2023-06-01Get full text
Article -
1026
Cities of Contagion: Pandemic Precarity, Migration, and Food Security in Urban Africa
Published 2025-01-01Get full text
Article -
1027
Opportunistic secure transmission scheme for simultaneous wireless information and power transfer
Published 2019-02-01Subjects: Get full text
Article -
1028
Analysis model of binary code security flaws based on structure characteristics
Published 2017-09-01Subjects: Get full text
Article -
1029
Role of Global Food Security in the Common Agrarian Policy of the European Union
Published 2014-04-01Subjects: “…global food security…”
Get full text
Article -
1030
Research on the security of national secret algorithm based compute first networking
Published 2023-08-01“…With the promotion of national secret algorithm, in-depth research on the arithmetic network was carried out, a more efficient and reasonable security scheme for the arithmetic network was proposed, ensuring the data security and privacy of the arithmetic network with the help of the state secret algorithm.The main elements of the design program included: Supporting arithmetic demand and cryptographic invocation through the underlying resources, the arithmetic orchestration layer provided the ability to orchestrate data arithmetic, meanwhile, the arithmetic scheduling layer intelligently discerned the optimal nodes for arithmetic resource scheduling and allocation; the cryptographic reinforcement layer used the national secret algorithm based on hardware support with the help of public key cryptosystem, hash function, digital envelope, homomorphic encryption, blockchain and other technologies.Focusing on arithmetic network access security, transmission security, data security and privacy protection aspects of security implementation.An architecture and application form was innovatively proposed to guarantee the data security of the arithmetic network, which could meet the needs of the application layer arithmetic in the scenarios of big data, intelligent technology, etc..The security of the arithmetic network is enhanced by empowering the arithmetic network through the state-secret algorithm.…”
Get full text
Article -
1031
Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review
Published 2019-01-01“…On the contrary, IoT has various security and privacy concerns for the end users that limit its proliferation. …”
Get full text
Article -
1032
Improvement on the XTP public key cryptosystem and communication protocol of provable security
Published 2007-01-01Subjects: Get full text
Article -
1033
Access control security model based on behavior in cloud computing environment
Published 2012-03-01“…In view of the current popular cloud computing technology,some security problems were analyzed.Based on BLP(Bell-LaPadula) model and Biba model,using the access control technology based on behavior to dynamic adjusting scope of subject's visit,it put forward the CCACSM ( cloud omputing access control security model).The model not only guarantees the cloud computing environment information privacy and integrity,and makes cloud computing environment with considerable flexibility and practical.At last,it gives the model's part,safety justice and realization process.…”
Get full text
Article -
1034
THE IMPACT OF DATA SECURITY ON THE INTENTION OF VIETNAMESE CONSUMERS TO USE E-WALLETS
Published 2023-04-01Subjects: “…data security…”
Get full text
Article -
1035
Assessing National and Military Security of Russia: Established Procedure and How to Improve It
Published 2020-11-01Subjects: “…national security…”
Get full text
Article -
1036
Predictive Policing and Enhancing Security Performance through Artificial Intelligence Applications
Published 2024-12-01“…This paper stress the importance of leveraging predictive technologies to foster preparedness, resilience, and security in an increasingly interconnected world. By modernizing infrastructures and embracing AI-driven strategies, nations can navigate the complexities of the digital era effectively, paving the way for sustainable progress and global stability.…”
Get full text
Article -
1037
Research on credit card transaction security supervision based on PU learning
Published 2023-06-01Subjects: Get full text
Article -
1038
Edwards curves based security authentication protocol for mobile RFID systems
Published 2014-11-01Subjects: Get full text
Article -
1039
ASSESSMENT OF SECURITY RISKS TO CRITICAL INFRASTRUCTURE WITHIN THE NATIONAL MINING SUBSECTOR
Published 2022-12-01Subjects: Get full text
Article -
1040
Secure Pesticide Storage: Using and Managing a Pesticide Storage Facility
Published 2004-10-01“…Revised: November 2004. PI33/PI068: Secure Pesticide Storage: General Features (ufl.edu) …”
Get full text
Article