Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1421
Design of precoding matrices in MIMO full duplex two-way security communication system
Published 2020-10-01Subjects: “…physical layer security…”
Get full text
Article -
1422
Problems, principles and prospects of international legal regulation of activities of private military and security companies
Published 2010-06-01Subjects: “…проект конвенции о чвоп. keywords: private military and security companies…”
Get full text
Article -
1423
Improving Oil Supply Security: Using a Risk Optimization Model to China and India
Published 2021-01-01“…Africa and North America will play a more important role in India’s oil supply security.…”
Get full text
Article -
1424
BORDER SECURITY AND TRANSNATIONAL THREATS: A COMPARATIVE ANALYSIS OF NIGERIA-NIGER BORDER DYNAMICS
Published 2023-12-01Subjects: Get full text
Article -
1425
Research status and development trends of security assurance for space-ground integration information network
Published 2016-11-01Subjects: Get full text
Article -
1426
Design for secure two-party computation protocol based on ElGamal variant’s homomorphic
Published 2015-02-01Subjects: “…secure two-party computation…”
Get full text
Article -
1427
-
1428
ESTIMATION OF ENERGY SECURITY OF AZERBAIJAN REPUBLIC WITH DUE ACCOUNT OF TENDENCY INFLUENCE ON INDICATORS’ CHANGES
Published 2014-02-01Subjects: “…energy security…”
Get full text
Article -
1429
Secure Event-Triggered Mechanism for Networked Control Systems under Injection Cyber-Attacks
Published 2022-01-01“…This study focuses on the secure stability issue of networked control systems (NCSs) under injection cyber-attacks (ICAs), which have important research value of applications for network security. …”
Get full text
Article -
1430
Succinct scheme of DCT coefficient selection towards enhanced security of JPEG image steganography
Published 2016-09-01Subjects: Get full text
Article -
1431
Secure D2D underlaying cellular communication based on artificial noise assisted
Published 2015-10-01Subjects: Get full text
Article -
1432
Enhancing data security and protection in marketing: a comparative analysis of Golang and PHP approaches
Published 2023-11-01Subjects: “…data security…”
Get full text
Article -
1433
Armed aggression of the Russian Federation against Ukraine as a threat to the collective security system
Published 2023-03-01Subjects: “…collective security…”
Get full text
Article -
1434
Evaluation, Energy Optimization, and Spectrum Analysis of an Artificial Noise Technique to Improve CWSN Security
Published 2013-06-01“…This paper presents the security evaluation, energy consumption optimization, and spectrum scarcity analysis of artificial noise techniques to increase physical-layer security in Cognitive Wireless Sensor Networks (CWSNs). …”
Get full text
Article -
1435
Security protection method based on mimic defense and Paillier encryption for smart IoT terminals
Published 2024-12-01“…In particular, the endogenous security and secure transmission issues faced by IoT edge-area smart terminals, due to uncertain threats like unknown vulnerabilities and backdoors, are of considerable concern in the realm of smart IoT. …”
Get full text
Article -
1436
Finnish and Swedish NATO membership: A path towards more regional security or instability?
Published 2024-01-01“…With the ascension of both Finland and Sweden to NATO, the Scandinavian and Baltic regions are facing the restructuring of the security architecture that can lead either toward more regional security or instability. …”
Get full text
Article -
1437
Chaotic Stream Cipher-Based Secure Data Communications over Intelligent Transportation Network
Published 2015-01-01“…To address the above security problems, we proposed a chaotic stream cipher-based cryptographic scheme to realise secure data communications over wireless sensor network (WSN), which is a part of ITS. …”
Get full text
Article -
1438
Food Acquisition Coping Strategies Vary Based on Food Security Among University Students
Published 2025-01-01“…Results: Despite targeted recruitment efforts, 76% of participants were classified as food secure by the United States Department of Agriculture (USDA) Adult Food Security Survey Module (AFSSM). …”
Get full text
Article -
1439
SviaB: Secure and verifiable multi‐instance iris remote authentication using blockchain
Published 2022-01-01“…In a malicious server setting, the server may return an arbitrary result to save computational resources, resulting in a false accept/reject. To address this, secure and verifiable multi‐instance iris authentication using blockchain (SviaB) is proposed. …”
Get full text
Article -
1440
Exploration and practice on integration of ideological, political courses into professional courses of cyberspace security specialty
Published 2022-04-01Subjects: “…cyberspace security…”
Get full text
Article