Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1361
Traffic-related air pollutants (TRAP) in relation to respiratory symptoms among security guards
Published 2025-01-01“…Occupational lung disease is a significant health concern in Malaysia, which, relatively little research on respiratory issues among Malaysian security personnel. The objective of this study is to evaluate the exposure level of TRAP PM2.5 and respiratory symptoms among security guards. …”
Get full text
Article -
1362
China-Pakistan Economic Corridor: Meeting Security Challenges in Balochistan Through Trade and Development
Published 2022-11-01Subjects: Get full text
Article -
1363
Measuring resilience properties of household livelihoods and food security outcomes in the risky environments of Ethiopia
Published 2018-11-01Subjects: Get full text
Article -
1364
Balancing on carbon storage and ecological security in urban areas: The case of Dongguan city, China
Published 2025-06-01Subjects: Get full text
Article -
1365
Data-driven modeling of background radiation structure utilizing matrix profile in nuclear security
Published 2025-01-01Subjects: Get full text
Article -
1366
Improve security monitoring knowledge management in IoT applications based on user behavior analysis
Published 2023-09-01“…Using the proposed method, users can transfer their data to IoT storage servers with more security than similar methods without knowing how and where to store it. …”
Get full text
Article -
1367
Secure Image Reconstruction using Deep Learning-based Autoencoder with Integrated Encryption Layers
Published 2024-12-01“… This study presents an autoencoder model designed for secure image reconstruction through the integration of encryption and decryption layers within its framework. …”
Get full text
Article -
1368
Federal Deep Learning Approach of Intrusion Detection System for In-Vehicle Communication Network Security
Published 2025-01-01“…CAN is susceptible to various network-level attacks due to the shortfall in security protocols. This article presents a new approach in addressing this challenge by introducing a unique intrusion detection system. …”
Get full text
Article -
1369
The politics of gating (A response to Private Security and Public Space by Manzi and Smith-Bowers)
Published 2008-05-01“…Critically then the risk is that ignoring the political and normative aspects of gating, as I believe Manzi and Smith-Bowers do, may lead to further and deeper socio-spatial segregation that itself excludes the voice of social groups least able to challenge or, indeed, reside in gated developments and the additional security that they appear to offer. …”
Get full text
Article -
1370
SOCIAL NETS AS A NEW FACTOR OF SYSTEM SECURITY IN RUSSIA IN THE 21ST CENTURY
Published 2016-12-01“…The article analyzes the interconnection of social aspects of the Internet and security issues in Russia. It shows that contemporary realities acquire global network character that has ambivalent impact on the development of civilizational and social interactions. …”
Get full text
Article -
1371
Secured Wireless Network Based on a Novel Dual Integrated Neural Network Architecture
Published 2023-01-01“…Owing to the importance of their users, components, and services to our everyday lives, the network must secure all of these. With such a wide range of devices and service types being present in the 5G ecosystem, security issues are now much more prevalent. …”
Get full text
Article -
1372
Asymptotic Distribution of Isolated Nodes in Secure Wireless Sensor Networks under Transmission Constraints
Published 2016-01-01“…The Eschenauer-Gligor (EG) key predistribution is regarded as a typical approach to secure communication in wireless sensor networks (WSNs). …”
Get full text
Article -
1373
-
1374
Toward secure and accountable data transmission in Narrow Band Internet of Things based on blockchain
Published 2019-04-01“…While Narrow Band Internet of Things is gradually designed for commercial applications, it also confronts with several security concerns such as identification and privacy. …”
Get full text
Article -
1375
Security authentication protocol based on elliptic curve cryptography and cookie information for terminal of IoT
Published 2016-06-01“…For the security problem of terminal devices accessing to the network server in internet of things(IoT),an identity authentication protocol was presented based on elliptic curve cryptography(ECC)and cookie information for internet of things terminal.Firstly,the protocol used user identity information,server private key,random number and expiration time of cookie to form a cookie file.Then,it was encrypted with ECC and stored in the smart terminal.In authentication phase,the mutual authentication was achieved by comparing the security parameters calculated by cookie information.Performance analysis shows that it can resist many kinds of attacks and provide high security,low computation and low communication cost,which was suitable for the terminal devices of limited resources in internet of things.…”
Get full text
Article -
1376
Assessment of the growing demographic threats to economic security in the regions of the North Caucasian Federal District
Published 2023-02-01Subjects: Get full text
Article -
1377
Recent Trends in Information and Cyber Security Maturity Assessment: A Systematic Literature Review
Published 2025-01-01Subjects: “…cyber security…”
Get full text
Article -
1378
Risk Prediction Algorithm of Social Security Fund Operation Based on RBF Neural Network
Published 2021-01-01“…In order to ensure the benign operation of the social security fund system, it is necessary to understand the social security fund facing all aspects of the risk, more importantly to know the relationship between different risks. …”
Get full text
Article -
1379
Mimic security scheduling algorithm for industrial control under limited heterogeneous resource constraints
Published 2021-03-01Subjects: “…endogenous safety and security…”
Get full text
Article -
1380