Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1561
-
1562
Angle and Context Free Grammar Based Precarious Node Detection and Secure Data Transmission in MANETs
Published 2016-01-01“…However, it produces additional overhead while securing the network. Hence, a Location and Trust-based secure communication scheme (L&TS) is proposed to overcome this limitation. …”
Get full text
Article -
1563
A security data detection and management method in digital library network based on deep learning
Published 2025-01-01Subjects: “…security data…”
Get full text
Article -
1564
Audit Analysis of Abnormal Behavior of Social Security Fund Based on Adaptive Spectral Clustering Algorithm
Published 2021-01-01“…Abnormal behavior detection of social security funds is a method to analyze large-scale data and find abnormal behavior. …”
Get full text
Article -
1565
Security access permission authentication simulation of multi-source network big data based on blockchain
Published 2024-02-01Subjects: Get full text
Article -
1566
CONCEPTUALIZING ENVIRONMENTAL POLICY: AN ANALYSIS OF RUSSIAN AND INTERNATIONAL LEGISLATION IN THE CONTEXT OF ENSURING ENVIRONMENTAL SECURITY IN THE ARCTIC
Published 2024-12-01“…This article presents the results of a study aimed at identifying differences in the environmental security policies embedded in the current legislation of Russia, China, the USA, and the European Union. …”
Article -
1567
Multidimensional evaluation of nutritional security policies in the Republic of Moldova: gaps, progress, and alignment with international standards
Published 2025-01-01Subjects: “…nutritional security…”
Get full text
Article -
1568
Proper selection of personnel for the Security Service of Ukraine as a prerequisite for the career growth of its employees
Published 2023-09-01Subjects: Get full text
Article -
1569
Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption
Published 2021-05-01Subjects: “…physical layer security…”
Get full text
Article -
1570
-
1571
A Comparative Survey of Centralised and Decentralised Identity Management Systems: Analysing Scalability, Security, and Feasibility
Published 2024-12-01“…Traditional identity management (IdM) solutions based on centralised protocols, such as Lightweight Directory Access Protocol (LDAP) and Security Assertion Markup Language (SAML), are where a central authority manages all the processes. …”
Get full text
Article -
1572
The effects of outdated data and outliers on Kenya’s 2019 Global Food Security Index score and rank
Published 2023-03-01Get full text
Article -
1573
A Long Shadow of World War II: Development of the National Security Concept in the United States
Published 2020-11-01Subjects: Get full text
Article -
1574
Contradictions of Collective Security Model: Modern Historiography on the Evolution of the Versailles System of International Relations in the 1930s
Published 2022-05-01Subjects: “…collective security…”
Get full text
Article -
1575
Research on cloud dynamic public key information security based on elliptic curve and primitive Pythagoras
Published 2025-02-01“…In order to solve the problems of key redundancy, transmission and storage security and the difficulty of realizing the one-time-secret mode in image encryption algorithm, this paper proposes a cloud dynamic public key information security scheme based on elliptic curve and primitive Pythagoras. …”
Get full text
Article -
1576
The Importance of Security Awareness in Combating Phishing Attacks: A Case Study of Bank Rakyat Indonesia
Published 2024-11-01Subjects: Get full text
Article -
1577
Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication
Published 2020-01-01“…Security has become one of the important factors for any network communication and transmission of data packets. …”
Get full text
Article -
1578
Oral Health Status and Anxiety Level Amongst the Borderline Security Force Personnel and Their Family Members
Published 2025-02-01“…The primary role of border security personnel is to safeguard borders against illegal trans-border activities during peacetime and provide military support during wartime. …”
Get full text
Article -
1579
Research on efficient and secure cross-domain data sharing of IoV under blockchain architecture
Published 2023-03-01“…To solve the problems of data disclosure, uncontrolled data access, and inefficiency of cross-domain data sharing in the Internet of vehicles (IoV), an efficient and secure cross-domain data sharing scheme of IoV under blockchain architecture was proposed.A blockchain was maintained by trusted authorities of different trust domains.A modified ciphertext-policy attribute-based encryption scheme was adopted to encrypt data, and encrypted data was stored in interplanetary file system (IPFS) with relevant information recorded on the blockchain, constructing a fine-grained and secure cross-domain data sharing scheme based on blockchain.A verification algorithm for cross-domain access based on the garbled Bloom filter was designed, and a smart contract executed fast decryption tests based on access policies on the blockchain, improving the access efficiency of a mass of ciphertext.A cross-domain data access method based on outsourcing decryption was designed, and the trusted authorities transformed ciphertexts while performing outsourcing decryption with complex bilinear pairing calculations, reducing the time overhead of vehicle decryption.Experiment results show that the proposed scheme is superior to other schemes in the process of cross-domain ciphertext transformation and vehicle decryption, and the cross-domain data access efficiency is increased by 60% on average.…”
Get full text
Article -
1580
The Association of Food Security With Hypertensive Disorders of Pregnancy: A National Health Interview Survey Analysis
Published 2025-01-01Subjects: “…food security…”
Get full text
Article