Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1381
NATIONAL SECURITY AND BORDER MANAGEMENT IN WEST AFRICA: A STUDY OF NIGERIA-NIGER RELATIONS
Published 2024-07-01Subjects: “…National Security…”
Get full text
Article -
1382
Cooperative interference power allocation in physical layer security under imperfect time synchronization
Published 2019-11-01Subjects: “…physical layer security…”
Get full text
Article -
1383
Enhancing Intelligent Transport Systems Through Decentralized Security Frameworks in Vehicle-to-Everything Networks
Published 2025-01-01“…The result is a substantial advancement in securing vehicular networks.…”
Get full text
Article -
1384
Shaping the 2010 Strategic Defence & Security Review : An Exercise in Squaring Conflicting Priorities
Published 2014-12-01Subjects: “…Strategic Defence and Security Review…”
Get full text
Article -
1385
Physics-Constrained Deep Learning for Security Ink Colorimetry with Attention-Based Spectral Sensing
Published 2024-12-01Subjects: Get full text
Article -
1386
-
1387
Providing a customer satisfaction model of non-attendance services in the social security organization
Published 2024-11-01“…AbstractThe purpose of this research is to provide a model of customer satisfaction with non-attendance services in the social security organization. The current research is applicable-developmental in terms of purpose; and descriptive-analytical based on the method. …”
Get full text
Article -
1388
Diegif: An efficient and secured DICOM to EGIF conversion framework for confidentiality in machine learning training
Published 2025-03-01“…Medical imaging plays a critical role in contemporary healthcare, although it confronts issues relating to storage, security, and confidentiality in machine learning-based diagnostic systems. …”
Get full text
Article -
1389
Practice analysis of domestic and foreign industry benchmarking enterprises in the field of network and information security
Published 2020-11-01Subjects: “…network and information security…”
Get full text
Article -
1390
Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership
Published 2015-09-01“…To solve the difficult problems of sensitive data deduplication in cloud storage,such as detection and PoW (proofs of ownership) of the duplicated ciphertext,the attacks aiming at data sensitivity,etc,a Merkle hash tree based scheme called MHT-Dedup and a homomorphic MAC based scheme called hMAC-Dedup were proposed.Both schemes provided PoW of the ciphertext file to find duplicated files on cross-user file level and check the hash of block plaintext to find duplicated blocks on local block-level,which avoided the security flaws of the hash-as-a-proof method in the cross-user file-level client-side duplication detection.MHT-Dedup provided the deterministic PoW of file with an authen-ticating binary tree generated from the tags of encrypted blocks,which had lower computing and transferring cost,and hMAC-Dedup provided the probabilistic PoW of file by verifying some sampled blocks and their homomorphic MAC tags,which had lower additional storage cost.Analyses and comparisons show that proposed schemes are preferable in many as-pects such as supporting secure two-level client-side sensitive data deduplication and resisting to brute force attack to blocks.…”
Get full text
Article -
1391
Endogenous security in the physical layer of wireless communications: key technologies, advantages and future challenges
Published 2024-10-01Subjects: “…wireless physical layer security…”
Get full text
Article -
1392
Android security reinforcing scheme of intelligent terminal based on certificate chain authentication mechanism
Published 2017-02-01Subjects: Get full text
Article -
1393
Provably secure quantum resistance two-server password-authenticated key exchange protocol
Published 2022-03-01Subjects: Get full text
Article -
1394
EdgeSecureDP: Strengthening IoHTs Differential Privacy Through Graphvariate Skellam
Published 2025-01-01“…These mechanisms treat data points independently, failing to account for the complex interconnections between nodes (drugs) and edges (interactions), leaves the network vulnerable to structural attacks that can reverse-engineer relationships, thus limiting the security of collaborative drug discovery. To address these limitations, this work proposes Graphvariate Skellam, a novel DP approach that leverages graph structure information in FL settings, referred to as EdgeSecureDP. …”
Get full text
Article -
1395
A deep learning-driven multi-layered steganographic approach for enhanced data security
Published 2025-02-01Subjects: “…Data security…”
Get full text
Article -
1396
Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions
Published 2018-01-01“…Intrusion detection, an important entity towards network security, has the ability to observe network activity as well as detect intrusions/attacks. …”
Get full text
Article -
1397
IoT Security: Botnet Detection Using Self-Organizing Feature Map and Machine Learning
Published 2024-12-01“…Experimental results indicate that this approach is effective for enhancing IoT security in resource-constrained devices.…”
Get full text
Article -
1398
Security decision method for the edge of multi-layer satellite network based on reinforcement learning
Published 2022-06-01“…The simulation results show that compared with the random edge security decision and the edge security decision oriented by the signal-to-noise ratio parameter,the method proposed has a greater advantage in the delay performance, and is comparable to the optimal edge security decision performance obtained by traversal.The difference is small. …”
Get full text
Article -
1399
An Evaluation of the Security Ability of the Basic Endowment Insurance System for China’s Urban and Rural Residents
Published 2022-01-01“…To evaluate security ability, a three-level evaluation index system with a total of 19 indicators is designed. …”
Get full text
Article -
1400
THE INSTITUTIONAL SYSTEM OF THE COMMON SECURITY AND DEFENCE POLICY (CSDP) OF THE EUROPEAN UNION: STRUCTURE AND MECHANICS
Published 2016-08-01Subjects: Get full text
Article