Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1161
Adaptive federated learning secure aggregation scheme based on threshold homomorphic encryption
Published 2023-07-01Subjects: Get full text
Article -
1162
Open platform and key technology of mobile application security depth detection capability
Published 2018-03-01Subjects: “…mobile application security…”
Get full text
Article -
1163
Verifiably secure fast group authentication protocol with anonymous traceability for Internet of vehicles
Published 2021-06-01“…Identity authentication is the first line of defense for vehicles to access IoV (Internet of vehicles).However, the existing schemes cannot meet the requirements of efficient authentication of IoV well, nor can they realize fast anonymous traceability.In view of this, a bidirectional anonymous traceability group authentication protocol was proposed in IoV.In this protocol, a number of RSU (road side unit) were grouped quickly and dynamically.And the vehicles entering the RSU group were authenticated with the one-way trap gating property and semi-group property of Chebyshev chaotic map.When the vehicle switched between the RSU within a group, the reverse hash chain was used for fast handover authentication.In addition, the RSU within a group can trace anonymously and revoke the identity of malicious vehicles quickly by using blockchain, and can also freely change the ID of users who reveal their real identity.At the same time, the semantic security of the proposed protocol is proved by using the random predictor model.Finally, simulation results show the proposed scheme has good security and effectiveness.…”
Get full text
Article -
1164
One Year after the Crisis in the Caucasus: Some Рroblems of the European Security
Published 2009-10-01Get full text
Article -
1165
Evolution game model of offense-defense for network security based on system dynamics
Published 2014-01-01Subjects: “…information security…”
Get full text
Article -
1166
Self-corrected coefficient smoothing method based network security situation prediction
Published 2020-05-01Subjects: “…security situation…”
Get full text
Article -
1167
Reference architecture of the telecom network security protection system for cloud network convergence
Published 2020-05-01Subjects: Get full text
Article -
1168
Application of human-in-the-loop hybrid augmented intelligence approach in security inspection system
Published 2025-01-01Subjects: Get full text
Article -
1169
Advancing Food Security with Farmed Edible Insects: Economic, Social, and Environmental Aspects
Published 2025-01-01Subjects: Get full text
Article -
1170
Research on the data link layer secure protocol of TES network based on ECC
Published 2009-01-01Subjects: Get full text
Article -
1171
A Game-Based Secure Localization Algorithm for Mobile Wireless Sensor Networks
Published 2015-09-01“…To address these challenges, the paper presents a novel game-based secure localization algorithm. The nodes' strategy level can be indicated through the results of trust evaluation and then by means of constructing reasonable strategy space and payoff function using game theory; all kinds of nodes within the network can achieve the optimal payoffs. …”
Get full text
Article -
1172
Key Technology About Security Audit of Mobile Network Traffic for Telecom Operator
Published 2015-12-01Subjects: Get full text
Article -
1173
Concept and Classification of Functions of State Policy in the Field of Ensuring Economic Security of the State
Published 2020-02-01Subjects: “…national security…”
Get full text
Article -
1174
THE SIGNIFICANCE OF LEGAL REGULATION IN ENSURING CYBER SECURITY IN THE CONDITIONS OF WAR: EXPERIENCE FOR UKRAINE
Published 2024-05-01Subjects: “…national security…”
Get full text
Article -
1175
Strategic autonomy of Russia in the changing international environment and consequences for the regional security of the Balkans
Published 2024-01-01“…The aim of the research is to analyze the realization of Russia's strategic autonomy by applying the concept of extended deterrence for the regional security of the Balkans. For this, the methods of discourse analysis (direction of Russian policy) and content analysis (individual strategic documents and statements of representative officials), case studies (Balkan regional framework) and synthesis are used. …”
Get full text
Article -
1176
Risks and countermeasures of artificial intelligence generated content technology in content security governance
Published 2023-10-01Subjects: Get full text
Article -
1177
A Secure Cooperative Spectrum Sensing Scheme in Mobile Cognitive Radio Networks
Published 2014-06-01“…However, in existing works, the problem of secure CSS in mobile cognitive radio networks (CRNs) has not been well considered yet. …”
Get full text
Article -
1178
Security protocol code analysis method combining model learning and symbolic execution
Published 2021-10-01Subjects: Get full text
Article -
1179
RETRACTED: Energy security and sustainable development from the standpoint of energy paradigm of Iran
Published 2024-01-01Get full text
Article -
1180
Application of security threat intelligence based on big data analysis in telecom operators
Published 2020-11-01“…As a powerful tool for operators to deal with means of new attack and ever-changing security threats,threat intelligence is also the core power to transform traditional passive defense into active defense.The importance of threat intelligence to operators was introduced,the productive process of threat intelligence was analyzed in detail,and finally the typical application scenarios of threat intelligence were given,which could provide technical reference for telecom operators in the practice of threat intelligence.…”
Get full text
Article