Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1041
Synchronization of chaotic optomechanical system with plasmonic cavity for secured quantum communication
Published 2025-01-01“…Our findings pave the way for enhanced coherence and reliability in secure quantum communication systems, thus contributing to the advancement of this rapidly evolving field.…”
Get full text
Article -
1042
Application of the Gordon Loeb model to security investment metrics: a proposal
Published 2024-12-01Subjects: Get full text
Article -
1043
A Security Data Forwarding Mechanism for Sparse Social Sensor Networks
Published 2015-08-01Get full text
Article -
1044
Malicious attack-resistant secure localization algorithm for wireless sensor network
Published 2016-12-01Subjects: Get full text
Article -
1045
The Problem of Energy Security in the Early 21st Century: Challenges and Opportunities
Published 2013-02-01Subjects: “…energy security…”
Get full text
Article -
1046
A Secure Image Encryption Algorithm Based on Rubik's Cube Principle
Published 2012-01-01“…These encryption algorithms typically use relatively small key spaces and thus offer limited security, especially if they are one-dimensional. In this paper, we proposed a novel image encryption algorithm based on Rubik's cube principle. …”
Get full text
Article -
1047
Formation of psychological security of the educational environment (on the example of the school in the Altai Republic)
Published 2020-12-01Subjects: Get full text
Article -
1048
Provably secure certificateless aggregate signature scheme in wireless roaming authentication
Published 2017-07-01Subjects: “…provably secure…”
Get full text
Article -
1049
Analytical skills of computer security students in the structure of analytical thinking readiness
Published 2015-11-01Subjects: Get full text
Article -
1050
Security capability analysis of software-based heterogeneous redundant execution system
Published 2021-09-01Subjects: Get full text
Article -
1051
A distributed data secure transmission scheme in wireless sensor network
Published 2017-04-01“…Therefore, it is difficult to ensure security of broadcasting data transferred from a single wireless sensor node to base station. …”
Get full text
Article -
1052
An endogenous safety and security technical framework inspired by biological immune system
Published 2021-03-01Subjects: “…endogenous safety and security…”
Get full text
Article -
1053
An Investigation into Information Security Managerial Practices in Selected Public Sector Organizations.
Published 2023“…The study aims to examine information security managerial practices in organisations. It was guided by three specific objectives: identification of information security practices critical to information assets management; establishment of implementation processes involved in the execution of structured information security governance; and evaluation of policies that influence information security best practices. …”
Get full text
Article -
1054
On the risks of secure attachment in infancy: Childhood irritability and adolescent depression predicted by secure attachment and high approach behaviours at 14-months towards a caregiver living with inter-parental violence
Published 2023-04-01“…IntroductionThe secure infant turns to a caregiver for comfort when distressed or threatened. …”
Get full text
Article -
1055
Private Cloud Assistant Trust Model for P2P Secure Transactions
Published 2015-01-01“…Secure transactions among P2P peers are critical for system stability. …”
Get full text
Article -
1056
Research and practice of network security threat intelligence management system for power enterprise
Published 2022-07-01Subjects: “…network security…”
Get full text
Article -
1057
Adaptive Security Solutions for NOMA Networks: The Role of DDPG and RIS-Equipped UAVs
Published 2024-11-01Subjects: “…non-orthogonal multiple access, reconfigurable intelligent surface, unmanned aerial vehicles, deep reinforcement learning, deep deterministic policy gradient, physical layer security.…”
Get full text
Article -
1058
Improving Network Security: An Intelligent IDS with RNN-LSTM and Grey Wolf Optimization
Published 2024-12-01“…The architecture of this RNN-LSTM with GWO IDS provides capable and responsive intrusion detection, training on previous data to be able to detect new threats. Made for network security by combining deep learning and optimization, tests reached 99.5% accurate. …”
Get full text
Article -
1059
A Secure and Green Cognitive Routing Protocol for Wireless Ad-Hoc Networks
Published 2024-01-01“…The COG Protocol offers green and secure routing based on cognitive elementary memory intelligence, making it highly suitable for energy-efficient and secure wireless ad hoc networks.…”
Get full text
Article -
1060
Secure resource allocation in hybrid energy-harvesting relay and full-duplex receiver
Published 2019-01-01Subjects: “…physical layer security…”
Get full text
Article