Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1061
Secure UAV-Based System to Detect Small Boats Using Neural Networks
Published 2019-01-01“…Given the high sensitivity of the managed information, the proposed system includes cryptographic protocols to protect the security of communications.…”
Get full text
Article -
1062
Research on consistency protection mechanism for secure states of virtual domain in cloud environment
Published 2016-10-01“…The traditional trusted computing architecture was suffering from the cloud uncertainty and dynamics caused by VM rollback or migration,which was a fatal threat to the cloud security.following investigations were conducted.Secure cloud virtual domain basic architecture; Time state consistence and collection mechanism.Cyber state consistence and collection mechanism.This study guaranteed security state consistence of virtual domain and improved the security and efficiency of the online service platform for both government institutions and companies.…”
Get full text
Article -
1063
INTERNAL CONTROL AS A TOOL OF SUPPORT ECONOMIC SECURITY OF THE ORGANIZATION AT THE MICRO LEVEL
Published 2021-04-01Subjects: Get full text
Article -
1064
RETRACTED: Improving the country’s food security in the conditions of developing a circular economy
Published 2024-01-01Get full text
Article -
1065
New kind of CD-DCSK chaos shift keying secure communication system
Published 2012-05-01“…As existing chaos keying communication systems had the issues of low data transmission rate and weak system confidentiality,a new kind of chaos shift keying communication system:CD-DCSK(correlation delay-differential chaos shift keying) was presented.At the same time lucubrated and simulated the communication performances of this new system.The theoretical deduction and emulational experimentation analysis verified that CD-DCSK has both merits of high confidentiality of CDSK and low BER of DCSK,and its transmission rate is twice as much as original shift keying schemes.Meanwhile,this new communication scheme perfectly achieved the secrecy transmission of age signal.Therefore,it can be clearly seen that this new system is realizable and has high security.…”
Get full text
Article -
1066
Analysis on Mobile Internet Application Security Issues Based on the Cloud Computing Mode
Published 2013-03-01Subjects: Get full text
Article -
1067
Advanced Approach to Information Security Management System Model for Industrial Control System
Published 2014-01-01“…Therefore, a new information security management system based on confidentiality, integrity, and availability as well as safety is required for ICSs. …”
Get full text
Article -
1068
Research on multi-party security collaborative linear regression for computing power networks
Published 2024-08-01Subjects: Get full text
Article -
1069
Correlation Analysis Approach About Numerous Security Information and Event in Telecommunication Network
Published 2013-10-01Subjects: “…security operations centre…”
Get full text
Article -
1070
Standards of living and human potential development: Assessing risks to regions’ economic security
Published 2025-01-01Subjects: “…economic security…”
Get full text
Article -
1071
Legal Regulation of Interaction of Security Service of Ukraine with Civil Society in Counteracting Terrorism
Published 2019-09-01“…The comparative legal method of the study analyzes the source base of national law concerning the interaction of the Security Service of Ukraine with civil society in fighting against terrorism. …”
Get full text
Article -
1072
THE SECURITY ASPECT OF TURKEY-UNITED STATES RELATIONS: IN SEARCH FOR A NEW MODEL
Published 2016-04-01“…Security cooperation has always been an important aspect of the relations between Turkey and the USA. …”
Get full text
Article -
1073
Enhancing concealed object detection in active THz security images with adaptation-YOLO
Published 2025-01-01Subjects: “…Active terahertz (THz) security image…”
Get full text
Article -
1074
Aukus (Australia-united kingdom-united states) threat to Indo-pacific security
Published 2024-11-01“…Countries can change their defense budgets based on their assessment of security threats in the region and changes in the balance of power. …”
Get full text
Article -
1075
RUS DIŞ POLİTİKASINDA GÜVENLİK FAKTÖRÜ - SECURITY FACTOR IN RUSSIAN FOREIGN POLICY
Published 2019-06-01Subjects: Get full text
Article -
1076
Aerial reconfigurable intelligent surfaces-assisted full-duplex UAV secure communication
Published 2024-07-01Subjects: “…UAV secure communication…”
Get full text
Article -
1077
Secure-Network-Coding-Based File Sharing via Device-to-Device Communication
Published 2017-01-01“…In order to increase the efficiency and security of file sharing in the next-generation networks, this paper proposes a large scale file sharing scheme based on secure network coding via device-to-device (D2D) communication. …”
Get full text
Article -
1078
Exploiting Dual-Output Programmable Blocks to Balance Secure Dual-Rail Logics
Published 2010-01-01“…However, assessing the security level which can be achieved with them is an important issue, as it is directly related to the suitability to use commercial FPGA instead of proprietary custom FPGA for this kind of protection. …”
Get full text
Article -
1079
School space as a "safe space" and "secure space": Educational and architectural challenges
Published 2024-01-01Subjects: Get full text
Article -
1080
Successive relaying secure transmission scheme based on inter-relay interference cancellation
Published 2017-09-01“…A secure scheme based on inter-relay interference cancellation was proposed to solve untrusted relay eavesdropping problem in successive relaying systems.First inter-relay interference between trusted relay and untrusted relay was exploited as artificial noise to degrade untrusted relay’s eavesdropping condition,then interference iterative cancellation was adapted to improve signal quality at legitimate user by making use of correlation between signals in time domain.Based on this,a quick power allocation algorithm aiming to minimize untrusted relay’s sum rate was proposed.Analysis and simulation results show that the proposed scheme suppress untrusted relay’s eavesdropping without loss of communication efficiency,a promotion of at least 2 bit·s<sup>-1</sup>·Hz<sup>-1</sup>in secrecy rate can be observed.…”
Get full text
Article