Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1641
End-Edge Collaborative Lightweight Secure Federated Learning for Anomaly Detection of Wireless Industrial Control Systems
Published 2024-01-01“…With the wide applications of industrial wireless network technologies, the industrial control system (ICS) is evolving from wired and centralized to wireless and distributed, during which eavesdropping and attacking become serious problems. To guarantee the security of wireless and distributed ICS, this article establishes an end-edge collaborative lightweight secure federated learning (LSFL) architecture and proposes an LSFL anomaly detection strategy. …”
Get full text
Article -
1642
A Blockchain-Assisted Federated Learning Framework for Secure and Self-Optimizing Digital Twins in Industrial IoT
Published 2025-01-01“…Optimizing digital twins in the Industrial Internet of Things (IIoT) requires secure and adaptable AI models. The IIoT enables digital twins, virtual replicas of physical assets, to improve real-time decision-making, but challenges remain in trust, data security, and model accuracy. …”
Get full text
Article -
1643
Deep learning–based resource allocation for secure transmission in a non-orthogonal multiple access network
Published 2022-06-01Get full text
Article -
1644
Ukraine-Russian Federation Relations within the Concepts of Security Dilemma and Responsibility To Protect (R2P)
Published 2023-07-01Subjects: “…international security…”
Get full text
Article -
1645
Recent advancements in durable and self-healing oil well cement: A pathway to secure carbon sequestration
Published 2025-02-01“…The integrity of the cement sheath in storage wells is essential to secure the subsurface CO2 storage, however, acidic CO2 can erode the cement sheath over time, leading to chemical and mechanical damages of cement, risking CO2 leakage. …”
Get full text
Article -
1646
Efficient and secure attribute-based heterogeneous online/offline signcryption for body sensor networks based on blockchain
Published 2019-09-01“…Moreover, hybrid blockchain provides advantages of interoperability, transparency traceability, and universal access. The formal security analysis of the proposed scheme is proved in the standard model, and informal security assures that our scheme provides resistance against possible attacks. …”
Get full text
Article -
1647
SYNERGY BETWEEN THE YOUTH AND A SECURED NATION: AN ATTEMPT TO DEVELOP NIGERIA THROUGH POLITICS AND ELECTORAL REMINISCENCE
Published 2024-05-01“…The study thereby recommends that; godliness, provision of employment opportunities by the government, secured borders, good parental care etc will improve on the security state of the nation. …”
Get full text
Article -
1648
Enhancing Secure Medical Data Communication Through Integration of LSB and DCT for Robust Analysis in Image Steganography
Published 2025-01-01“…Steganography enhances data security by embedding information seamlessly within digital channels. …”
Get full text
Article -
1649
Multidimensional comparative analysis of the number of students in Poland with the view to the demographic crisis and its impact on social security
Published 2024-12-01Subjects: Get full text
Article -
1650
2003 Handbook of Employment Regulations Affecting Florida Farm Employers and Workers: Social Security and Medicare [Federal]
Published 2003-07-01“… The purpose of Social Security and Medicare is to provide social benefits to qualified workers who retire, become disabled, and/or require medical assistance. …”
Get full text
Article -
1651
2003 Handbook of Employment Regulations Affecting Florida Farm Employers and Workers: Social Security and Medicare [Federal]
Published 2003-07-01“… The purpose of Social Security and Medicare is to provide social benefits to qualified workers who retire, become disabled, and/or require medical assistance. …”
Get full text
Article -
1652
Research on power plant security issues monitoring and fault detection using attention based LSTM model
Published 2025-01-01Subjects: Get full text
Article -
1653
Cyber-Physical System Security for Manufacturing Industry 4.0 Using LSTM-CNN Parallel Orchestration
Published 2025-01-01“…Its innovative concept, the distinctive mechanism of the PLO algorithm, and applying it in a simulated manufacturing industry make the proposed security system superior to comparable approaches.…”
Get full text
Article -
1654
Prerequisites for the legal mechanisms development to combat disinformation in social media in the context of national security: problem statement
Published 2021-12-01Subjects: Get full text
Article -
1655
-
1656
Securing safer care staff: a model for the assessment, selection and training of staff to work in residential care
Published 2006-03-01Subjects:Article -
1657
Designing the Interventions to Mitigate the Barriers of Coordination in Handling Food Security: Insight from Central Java Province
Published 2022-01-01“…This study aims to identify the underlying barriers that may prevent public policy coordination among stakeholders in dealing with food security in Central Java Province and suggest recommendations to enhance the coordination. …”
Get full text
Article -
1658
Warehouse mobile access network security associate pre-anticipated notification scheme based on AAA authentication
Published 2012-09-01Subjects: Get full text
Article -
1659
Marilena Koppa. The Evolution of the Common Security and Defence Policy: Critical Junctures and the Quest for EU Strategic Autonomy
Published 2024-04-01“…The Evolution of the Common Security and Defence Policy: Critical Junctures and the Quest for EU Strategic Autonomy. …”
Get full text
Article -
1660
Advancing hospital healthcare: achieving IoT-based secure health monitoring through multilayer machine learning
Published 2025-01-01“…Because of this, the conceptual IoT-based secure health monitoring system employs machine learning algorithms for enhanced accuracy. …”
Get full text
Article