Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1141
The Long-Term Effects of Reforming Social Security to Relieve Low-Income Households
Published 2021-10-01“…Abstract In this paper, we use a macroeconomic model to evaluate two reform proposals that, first, abolish the exemption from social security contributions for marginal employment (“mini jobs”) and, second, reduce social security contributions for low-income earners. …”
Get full text
Article -
1142
Cross-border cooperation as a key element of internal security – selected aspects
Published 2024-09-01Subjects: “…security…”
Get full text
Article -
1143
Correlation of the terms “social order” and “public order”, “social security” and “public safety”
Published 2024-06-01Subjects: “…national security…”
Get full text
Article -
1144
Bankruptcy forecasting in enterprises and its security using hybrid deep learning models
Published 2025-12-01“…Cyber Security and Applications…”
Get full text
Article -
1145
Secure opportunistic access control in D2D-enabled cellular network
Published 2018-01-01“…The mutual interference between cellular links and D2D links can bring the secrecy gain to cellular users in D2D-enable cellular networks.To make full use of them,a cooperative secrecy transmission scheme was proposed based on wireless channels.The channel direction information and gains depict the interference from D2D links to cellular links and other D2D links in the proposed scheme.Firstly,only the D2D users which meet the limited interference conditions were accessed to cellular networks to ensure their reliable communications.It was assumed that legitimate users and eavesdroppers were independent two-dimensional homogeneous Poisson point processes (PPP) distribution.Then the security outage probability (SOP) was derived for cellular users and the connection outage probability (COP) for D2D users,and the impacts of interference thresholds were discussed on their performances.Next,an optimization model was given to minimize D2D users’ COP while ensuring the secrecy performance requirements of cellular users,thus achieving the optimal performance.Finally,simulation results verify the validity of the proposed scheme.…”
Get full text
Article -
1146
Editorial: Multilevel medical security systems and big data in healthcare: trends and developments
Published 2025-01-01Subjects: “…multilevel medical security systems…”
Get full text
Article -
1147
A survey of physical layer security in space-air-ground communication and networks
Published 2020-09-01Subjects: Get full text
Article -
1148
Optimizing Secure AI Lifecycle Model Management With Innovative Generative AI Strategies
Published 2025-01-01Subjects: Get full text
Article -
1149
Evaluation on Security of Water Resources in Shiyan City Based on Water Poverty Index
Published 2020-01-01Subjects: Get full text
Article -
1150
Inter-Cloud Data Security Framework to Build Trust Based on Compliance with Controls
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
1151
Federated Reinforcement Learning in Stock Trading Execution: The FPPO Algorithm for Information Security
Published 2025-01-01Get full text
Article -
1152
Dual-Mode Encryption for UC-Secure String OT from Learning with Errors
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
1153
5G Networks Security Mitigation Model: An ANN-ISM Hybrid Approach
Published 2025-01-01Subjects: Get full text
Article -
1154
Gazprom on the European Market: In Search of the Balance between the Principles of Competition and Energy Security
Published 2014-08-01Subjects: Get full text
Article -
1155
Performance optimization of physical layer security in STAR-RIS aided NOMA system
Published 2024-05-01Subjects: Get full text
Article -
1156
Security Challenges: Appraisal of Threats to Nigeria’s Sovereignty in the Fourth Republic (1999-2019)
Published 2023-07-01Subjects: Get full text
Article -
1157
Assessing the impact of the country’s economic security on export development in the agro-industrial sector
Published 2022-05-01Subjects: Get full text
Article -
1158
Research on critical SNR and power allocation of artificial noise assisted secure transmission
Published 2019-06-01Subjects: “…physical layer security…”
Get full text
Article -
1159
Security communication and energy efficiency optimization strategy in UAV-aided edge computing
Published 2023-03-01Subjects: Get full text
Article -
1160
Protection and Control of the State Border as a Component of Ensuring National Security of Ukraine
Published 2019-09-01Subjects: Get full text
Article