Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1461
Exploration of teaching method incorporating ideological elements for the cutting-edge technology of cyberspace security
Published 2019-06-01Subjects: “…cyberspace security…”
Get full text
Article -
1462
Influence of Internet plus on cyberspace security and the technology development trend in Internet plus era
Published 2017-05-01Subjects: Get full text
Article -
1463
Retracted: A Microgrid Security Defense Method Based on Cooperation in an Edge-Computing Environment
Published 2023-01-01Get full text
Article -
1464
Analyzing Rail Traffic Diversion Based on Machine Learning Technique considering Transportation Security
Published 2022-01-01“…Based on a stated preference survey, we comprehensively analyze the travel psychology of residents and the advantages and disadvantages of rail transit and conventional buses, travel time, travel cost, travel security, and vehicle comfort and investigate the relationship between the relevant influencing factors and the transition probability from rail transit to buses. …”
Get full text
Article -
1465
Study of Water Resources Security Guarantee Mechanism in Economic Zone in North Bay in Guangxi
Published 2010-01-01Get full text
Article -
1466
Implementation of lightweight intrusion detection model for security of smart green house and vertical farm
Published 2018-04-01“…Development and implementation of smart green houses and vertical farms are two major solutions for the expected crisis, but as other ICT-based systems, their security problems must be dealt with. Nevertheless, current network forensics is still unable to fully monitor and analyze computer network traffic to gather the evidences of malicious attacks or intrusions. …”
Get full text
Article -
1467
Competence and Authorization of the Security Service Of Ukraine as a Subject to Anti-Corruption and Organized Crime
Published 2020-06-01Subjects: Get full text
Article -
1468
Charging wireless sensor network security technology based on encryption algorithms and dynamic model
Published 2020-02-01“…Wireless networks cover all aspects of life, along with it, network security issues have gradually emerged. In recent years, network security vulnerabilities have been exposed continuously, from WiFi to Bluetooth, people gradually realize the security of wireless networks. …”
Get full text
Article -
1469
Provably secure and efficient certificateless sequential multi-signature scheme in random oracle model
Published 2014-11-01Subjects: Get full text
Article -
1470
Security of Smart Grid: Cybersecurity Issues, Potential Cyberattacks, Major Incidents, and Future Directions
Published 2025-01-01Subjects: Get full text
Article -
1471
Foodscape: A scoping review and a research agenda for food security-related studies.
Published 2020-01-01Get full text
Article -
1472
-
1473
RETRACTED: Zero net energy building design as the way to increase the energy security of Armenia
Published 2023-01-01Get full text
Article -
1474
USE OF ICT BASED SYSTEMS IN SITE SECURITY MANAGEMENT: A SOUTH AFRICAN STUDY
Published 2014-12-01Subjects: “…ICT, Security systems, site theft, site management, site security management…”
Get full text
Article -
1475
Examining the drivers of ecological footprint components: Is pursuing food security environmentally costly for Nigeria?
Published 2025-01-01“…The result of the investigation provides insight and measures for improving food security without necessarily increasing ecological pressure. …”
Get full text
Article -
1476
A Secure Data Sharing Model Utilizing Attribute-Based Signcryption in Blockchain Technology
Published 2024-12-01Subjects: Get full text
Article -
1477
Survey of physical layer security of intelligent reflecting surface-assisted wireless communication systems
Published 2022-02-01Subjects: Get full text
Article -
1478
SynthSecureNet: An Improved Deep Learning Architecture with Application to Intelligent Violence Detection
Published 2025-01-01Subjects: Get full text
Article -
1479
Food Security in the Wake of Perennial Crop Farming. Paradoxes Underlying Commercial Agriculture in Kigezi.
Published 2023“…This study establishes that the tea sector has not in any way affected food security in the region of Kigezi and has instead improved house hold incomes, been a source of employment and boosted revenue for households. …”
Get full text
Article -
1480
The Effect of Hiv/Aids Scourge on Food Security in Nyabbani Sub-County, Kitagwenda District.
Published 2023Subjects: Get full text
Thesis