Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1521
-
1522
Research on energy-efficient physical-layer secure transmission mechanism in decode-and-forward cooperative networks
Published 2017-01-01Subjects: Get full text
Article -
1523
Personal data security as a form of legal certainty for the fulfillment of consumer rights for online loans
Published 2024-10-01Subjects: “…personal data security, online lending, consumer protection, financial services authority, legal certainty…”
Get full text
Article -
1524
Farmers-Herders Conflict and Nigeria’s Quest for Food Security: The Imperative Need for Information Communications Technology
Published 2021-12-01“…In recent times, many scholarly studies and inquiries on the impact of Information Communications Technology, particularly with respect to promoting food security in Nigeria, have been engendered mainly by the need to ensure greater agricultural outputs among farmers and other agriculturists. …”
Get full text
Article -
1525
Mitigating Software Vulnerabilities through Secure Software Development with a Policy-Driven Waterfall Model
Published 2024-01-01“…For the past few years, software security has become a pressing issue that needs to be addressed during software development. …”
Get full text
Article -
1526
-
1527
Smart Geopolitics, Dangerous Ideas: Energy security, Ideology, and the Challenges of American Policy in the Persian Gulf
Published 2016-08-01Subjects: Get full text
Article -
1528
-
1529
Conditioned secure access control model based on multi-weighted roles and rules in workflow system
Published 2008-01-01“…The traditional RBAC model cannot express complicated workflow secure access control constraint, so a new conditioned RBAC model suit for WfMS (workflow management system)—CMWRRBSAC (conditioned multi-weighted role and rule based secure access control model) was proposed on the basis of multi-weighted roles and rules. …”
Get full text
Article -
1530
Optimal Joint Defense and Monitoring for Networks Security under Uncertainty: A POMDP-Based Approach
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
1531
-
1532
Bioinspired Blockchain Framework for Secure and Scalable Wireless Sensor Network Integration in Fog–Cloud Ecosystems
Published 2024-12-01Subjects: Get full text
Article -
1533
A study on the impact of accounting information security controls on the effectiveness of internal controls in Vietnamese enterprises
Published 2025-03-01Subjects: “…Accounting information security…”
Get full text
Article -
1534
Investigation,analysis and improvement mentality of the revision on information security’s training program to undergraduates in Hunan University
Published 2020-08-01Subjects: Get full text
Article -
1535
Water insecurity is human: why social science must be at the core of water security research and practice
Published 2025-01-01“…To address this, the emerging science of water security can build on well-established and theoretically-robust findings from social science. …”
Get full text
Article -
1536
Assessing the role of local councils in the development of sustainable urban security (Case Study; Urmia City)
Published 2023-06-01“…Conclusions: Based on the Friedman test, among the research items, the second item is "Social Security Development", and the first item is "Economic Security Development". …”
Get full text
Article -
1537
A Novel Approach Based on Machine Learning, Blockchain, and Decision Process for Securing Smart Grid
Published 2024-01-01“…This paper presents a new approach that integrates Machine Learning (ML), Blockchain Technology (BT), and Markov Decision Process (MDP) to improve the security of SG networks while ensuring accurate storage of events reported by various network devices through BT. …”
Get full text
Article -
1538
Research on the anti-synchronization chaos system group &large scale distributed system security communication
Published 2017-07-01Subjects: “…secure communication…”
Get full text
Article -
1539
The role of international support programmes in global health security capacity building: A scoping review.
Published 2023-01-01“…Large scale public health emergencies such as COVID-19 demonstrate the importance of Global Health Security (GHS) and highlight the necessity of resilient public health systems capable of preparing for, detecting, managing, and recovering from such emergencies. …”
Get full text
Article -
1540
Solution of secure multi-party multi-data raking problem based on El Gamal encryption
Published 2007-01-01Subjects: “…secure multi-party multi-data rank…”
Get full text
Article