Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1081
Relevant Problems of Implementing State Policy in the Field of Ensuring Information Security of Ukraine
Published 2021-07-01Subjects: “…information security…”
Get full text
Article -
1082
Physical layer security of NOMA-D2D cooperative wireless system
Published 2022-09-01Subjects: Get full text
Article -
1083
Secure performance analysis of relay systems with multi-relay and multi-user selection
Published 2019-08-01Subjects: Get full text
Article -
1084
Research on Situation Awareness Model of Information Content Security Incidents in Telecommunication Network
Published 2014-02-01“…Aiming at the main features of the information content security incidents and telecommunication network themselves,a design of situation awareness model was presented.The model using distributed character data collection and hierarchical progressive integration,the status of security situation of the whole telecommunication network was analyzed.According to the structure of model,hierarchical information fusion proximate calculation based on evidence theory was used to resolve the problem of how to use the initial information to determine the probability in high level information fusion.The simulation results show that the model can compute fast in real time in high accuracy,and it can perceive and determine the incidents effectively.…”
Get full text
Article -
1085
Livelihood training, food production, and food security among vulnerable communities in Bangladesh
Published 2025-01-01“…Agriculture & Food Security…”
Get full text
Article -
1086
A Survey of Ontologies Considering General Safety, Security, and Operation Aspects in OT
Published 2024-01-01Subjects: Get full text
Article -
1087
Securely redundant scheduling policy for MapReduce based on dynamic domains partition
Published 2014-01-01Subjects: Get full text
Article -
1088
Global energy security: new challenges and prospects for Russian-American energy cooperation
Published 2010-08-01Get full text
Article -
1089
Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks
Published 2012-11-01“…An overview of supervisory control and data acquisition (SCADA) systems is presented and relevant security concerns are addressed. To secure IP-based SCADA systems, it is vital to implement secure architectures which prevent access to the SCADA from corporate IT, in addition to excellent management practices in managing IP-based networks. …”
Get full text
Article -
1090
Evaluating the network security by the Read<sub>W</sub>rite transition model
Published 2010-01-01Subjects: Get full text
Article -
1091
A secure message-passing framework for inter-vehicular communication using blockchain
Published 2019-02-01“…To address the issues, we proposed a secure distributed message-passing framework that does not require a centralized server, and it rates the credibility of message source using blockchain technology. …”
Get full text
Article -
1092
Secure supply and demand relationship perception routing in intermittently connected wireless networks
Published 2015-11-01Subjects: Get full text
Article -
1093
Research on trust sensing based secure routing mechanism for wireless sensor network
Published 2017-10-01Subjects: Get full text
Article -
1094
Data Security in Autonomous Driving: Multifaceted Challenges of Technology, Law, and Social Ethics
Published 2024-12-01Subjects: Get full text
Article -
1095
The India-US Security and Defense Cooperation under Narendra Modi: Challenges and Assessments
Published 2024-12-01Subjects: Get full text
Article -
1096
Lightweight and secure vehicle track verification scheme via broadcast communication channels
Published 2023-10-01Subjects: Get full text
Article -
1097
Wireless Secure Communication Based on Code Domain Space-Time Modulated Metasurface
Published 2024-12-01Subjects: Get full text
Article -
1098
Trusted coalition-proof protocol model based on secure multi-part computing
Published 2011-01-01Subjects: “…secure multi-part…”
Get full text
Article -
1099
Secure contact tracing platform from simplest private set intersection cardinality
Published 2022-09-01“…IET Information Security…”
Get full text
Article -
1100
Analysis of Water Quality Security in Beimiao Reservoir in Baoshan City in Yunnan Province
Published 2008-01-01Get full text
Article