Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1581
Exploring offshore wind’s potential to enhance energy security in nations with limited land and fuel resources
Published 2025-01-01Subjects: Get full text
Article -
1582
The Relationship between Russian Identity and Political Polarization: The Role of Secure National Identification and National Narcissism
Published 2025-01-01“…</strong>To analyse the relationship between secure national identification and national narcissism with political polarization (intergroup differentiation between people with different political views). …”
Get full text
Article -
1583
The effectiveness of monitoring as a necessary condition for the adoption of correct decisions on the security оf technosphere
Published 2020-04-01Subjects: “…security оf technosphere…”
Get full text
Article -
1584
Design scheme of physical layer security for intelligent reflecting surface-assisted MISO communication system
Published 2022-01-01Subjects: Get full text
Article -
1585
An Efficient and Hybrid Deep Learning-Driven Model to Enhance Security and Performance of Healthcare Internet of Things
Published 2025-01-01“…However, H-IoT devices present security and Quality of Service (QoS) concerns because of their critical nature, complexity, and dynamic features, which make them incompatible with conventional network topologies. …”
Get full text
Article -
1586
Industrial Pipe-Rack Health Monitoring System Based on Reliable-Secure Wireless Sensor Network
Published 2012-10-01“…However, for the application of WSN technology in large-scale industrial plants, issues of reliability and security should be fully addressed, and an industrial sensor network standard that mitigatesthe problem of compatibilitywith legacy equipment and systems should be established. …”
Get full text
Article -
1587
A Bibliometric Analysis of Agent-Based Systems in Cybersecurity and Broader Security Domains: Trends and Insights
Published 2025-01-01Subjects: Get full text
Article -
1588
Robust secure design for relay wireless sensor networks with simultaneous wireless information and power transfer
Published 2017-06-01“…In this article, we investigate the physical layer security problem in relay wireless sensor networks with simultaneous wireless information and power transfer. …”
Get full text
Article -
1589
Network Architecture, Security Issues, and Hardware Implementation of a Home Area Network for Smart Grid
Published 2012-01-01“…This paper discusses aims, architecture, and security issues of Smart Grid, taking care of the lesson learned at University of Pisa in research projects on smart energy and grid. …”
Get full text
Article -
1590
Dynamics of the Indonesian Parliament in Formulating Food Laws to Achieve Food Security at the End of the New Order
Published 2024-07-01Subjects: Get full text
Article -
1591
INFLUENCE OF SECURITY CHALLENGES ON STUDENT ACADEMIC PERFORMANCE IN COLLEGE OF EDUCATION BILLIRI, GOMBE STATE, NIGERIA
Published 2024-06-01“…The major recommendations by the researchers are the management of the college are to invest in advanced and reliable security equipment, ensure the presence of adequately trained security personnel and implement comprehensive and effective security policies and procedures and establish counseling and psychological support services to help students manage stress and anxiety related to insecurity. …”
Get full text
Article -
1592
Security analysis of public-key cryptosystems based on matrix action problem against quantum attack
Published 2023-03-01Get full text
Article -
1593
Determinants of Rural Household Food Security Status in North Shewa Zone, Amhara Region, Ethiopia
Published 2022-01-01“…This paper used the calorie intake method per day to measure household food security status and a logit model to investigate the determinants of food security. …”
Get full text
Article -
1594
A flexible continuous-wave quantum cryptography scheme with zero-trust security for Internet of Things
Published 2022-11-01“…As quantum computing techniques develop rapidly, the security of classical communication, which is usually based on public key encryption algorithm, is under great threat. …”
Get full text
Article -
1595
The association between household’s asset ownership and food security: panel data evidence from Bangladesh
Published 2025-01-01Subjects: Get full text
Article -
1596
Task security scheduling method for 5G+MEC based grid edge computing platform
Published 2022-12-01Subjects: Get full text
Article -
1597
A Survey on Reconfigurable Intelligent Surface for Physical Layer Security of Next-Generation Wireless Communications
Published 2024-01-01Subjects: Get full text
Article -
1598
The Relationship between Corporate Social Responsibility (CSR) Reporting and Financing (Bank Loans and Debt Securities)
Published 2024-09-01Subjects: Get full text
Article -
1599
-
1600
U.S. trade in the sphere of strategic products and services as the first level of analysis of its economic security
Published 2024-01-01Subjects: Get full text
Article