Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1241
Physical layer security for SWIPT-NOMA system in presence of randomly located eavesdroppers
Published 2022-03-01Subjects: Get full text
Article -
1242
CYBER SECURITY ANALYSIS OF IOT DEVICES TRANSMITTING DATA IN THE THINGSPEAK PLATFORM CLOUD
Published 2022-10-01Subjects: “…IoT security, sniffing IoT attacks, ThingSpeak, IoT, IoT attacks…”
Get full text
Article -
1243
Using random subcarrier weighting for multi-carrier systems physical layer security
Published 2012-10-01Subjects: Get full text
Article -
1244
A Secure and Robust Machine Learning Model for Intrusion Detection in Internet of Vehicles
Published 2025-01-01“…Although these technologies provide unparalleled connectivity and communication capabilities, they also introduce new security challenges, particularly in terms of Intrusion Detection. …”
Get full text
Article -
1245
Identity-based domain key distribution protocol in the E-document security management
Published 2012-05-01Subjects: Get full text
Article -
1246
Research and practice of software-defined security technology architecture in the 5G+ era
Published 2021-12-01Subjects: “…software-defined security…”
Get full text
Article -
1247
A gendered analysis of adaptive capacity and food security in Makueni County, Kenya
Published 2025-01-01Subjects: Get full text
Article -
1248
Azerbaijan-Türkiye Relations in the Context of Security Community: One Nation, Two States
Published 2024-12-01Subjects: “…security community…”
Get full text
Article -
1249
Evolution entropy risk assessment of ERP information security based on the business process
Published 2012-09-01Subjects: Get full text
Article -
1250
Construction of cyberspace security course system of comprehensive practice and graded customs clearance
Published 2019-06-01Subjects: Get full text
Article -
1251
Eucalyptus-based livelihoods: enhancing household food security and resilience in Northwest Ethiopia
Published 2025-02-01“…Farmers in northwest Ethiopia have been transforming their livelihood strategies, however, the impact of this transformation on food security status and resilience is hardly investigated. …”
Get full text
Article -
1252
Monitoring Brazilian Food Security Based on Emergy Concepts: A Proposed Approach
Published 2024-12-01“…This study enhances the discussion on food security by examining trade equity between food consumers and the supply chain from an emergy perspective. …”
Get full text
Article -
1253
Secure privacy-preserving record linkage system from re-identification attack.
Published 2025-01-01“…Our method's efficacy was validated through simulations on the Titanic and North Carolina Voter Records (NCVR) datasets, demonstrating a substantial reduction in re-identification rates. Security analysis confirms that our zero-relationship encoding effectively preserves privacy against graph-based re-identification threats, improving PPRL technology's security.…”
Get full text
Article -
1254
Problems of Designing Complex Information Security System for Cloud Resources in the Republic of Belarus
Published 2021-10-01Subjects: Get full text
Article -
1255
THE UN SECURITY COUNCIL ACTING ON SYRIA IN THE CONTEXT OF EMERGING MULTIPOLARITY OF INTERNATIONAL RELATIONS
Published 2018-02-01Subjects: Get full text
Article -
1256
-
1257
Production of Rice in Nigeria: The Role of Indian-Nigerian Bilateral Cooperation in Food Security
Published 2020-07-01“…The paper concludes that the agreements, particularly the one of 2017, have further promoted, strengthened and expanded rice production in the context of food security, job creation and saving foreign exchange. …”
Get full text
Article -
1258
RETRACTED: Machine learning as an integral part of the security strategy of production business processes
Published 2024-01-01Get full text
Article -
1259
Adaptable Security in Wireless Sensor Networks by Using Reconfigurable ECC Hardware Coprocessors
Published 2010-10-01“…Specific features of Wireless Sensor Networks (WSNs) like the open accessibility to nodes, or the easy observability of radio communications, lead to severe security challenges. The application of traditional security schemes on sensor nodes is limited due to the restricted computation capability, low-power availability, and the inherent low data rate. …”
Get full text
Article -
1260
Pakistan’s Water Security Crisis: Challenges and the Case for Integrated Water Resource Management
Published 2025-01-01Subjects: Get full text
Article