Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1621
Study on enhancing integrity for BLP model
Published 2010-01-01Subjects: “…information security…”
Get full text
Article -
1622
From pyramid to pillar : population change and social security in Europe.
Published 1989Subjects: “…Social security Europe. 10386…”
View in OPAC
Book -
1623
Protection and Security Method for Multiple Energy Power Plant-Based Microgrids Using Dual Filtering Algorithm
Published 2025-01-01Subjects: Get full text
Article -
1624
Design and Construction of an Aquaponics System: A Sustainable Approach to Enhancing Local Food Security in Offa, Nigeria
Published 2025-02-01Subjects: Get full text
Article -
1625
-
1626
Design of an improved model using federated learning and LSTM autoencoders for secure and transparent blockchain network transactions
Published 2025-01-01“…Abstract With the advancement of this digital era and the emergence of DApps and Blockchain, secure, robust and transparent network transaction has become invaluable today. …”
Get full text
Article -
1627
Investigating the effect of sense of security and perceived value on tourists\' spatial attachment Case Study (Zanjan Province)
Published 2022-09-01Subjects: “…feelings of security…”
Get full text
Article -
1628
Retracted: Construction of Social Security Fund Cloud Audit Platform Based on Fuzzy Data Mining Algorithm
Published 2023-01-01Get full text
Article -
1629
Comparison of Port Security Switch Layer 2 MAC Address Dynamic With MAC Address Static Sticky
Published 2022-12-01Subjects: Get full text
Article -
1630
Investigating the relationship between the sense of belonging to the place and the level of social security of citizens - Case study: Qom-
Published 2021-06-01Subjects: “…security…”
Get full text
Article -
1631
Development of face image recognition algorithm using CNN in airport security checkpoints for terrorist early detection
Published 2025-01-01Subjects: “…airport security…”
Get full text
Article -
1632
Multi-hop broadcast message dissemination in vehicular ad hoc networks: A security perspective review
Published 2017-11-01“…Among these issues, those related to security are of particular importance. In this article, the main security issues of broadcast message dissemination in vehicular ad hoc networks are discussed. …”
Get full text
Article -
1633
-
1634
N − 1 Security Criteria Based Integrated Deterministic and Probabilistic Framework for Composite Power System Reliability
Published 2024-01-01“…In this paper, N − 1 security criteria based reliability of the composite power system (CPS) is proposed using an integrated deterministic and probabilistic framework (D-P) considering outage of the transmission line. …”
Get full text
Article -
1635
Studying the Common Chapter on the Competences of the Islamic Council Parliament and the Supreme National Security Council on the Issue of JCPOA
Published 2024-09-01Subjects: Get full text
Article -
1636
Approach of information security assessment for ATM system based on improved BP model of artificial neural network
Published 2011-01-01Subjects: Get full text
Article -
1637
Theorizing International Politics of Research, Science, and Technology: Implications for Global Governance, National Security, and Economic Growth
Published 2023-07-01“… This article examines the value of understanding the international politics surrounding research, science and technology (RST) in today‟s world.It encompasses intricate connections between nations, international organizations, and multinational enterprises,which is essential for economic growth, social development, and national security.The significance of elements like anarchy, capitalism, welfare, and security that influences the global politics of RST is highlighted in the essay.In order to counteract technology misuse, the authors stress the significance of establishing ethical standards. …”
Get full text
Article -
1638
The Impact of Peatland Damage and Its Influence on Food Security Policy in Sungai Apit Sub-District in 2023
Published 2025-01-01Subjects: Get full text
Article -
1639
A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks
Published 2013-05-01“…However, they have serious limitations in terms of security and usability. First, even though they are enhancements of other works, they still have several security flaws, such as vulnerability against parallel session, privileged-insider, and gateway-node bypassing attacks and lack of mutual authentication between user station and gateway node. …”
Get full text
Article -
1640
Religion and Public Policy: Digital-Based Islamic Political Economy and Human Security on Covid-19 Handling
Published 2022-07-01Subjects: Get full text
Article