Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1681
Construction of the ecological security pattern of Mu Us sandy land on the basis of the “Source − Resistance − Corridor” theory
Published 2025-02-01Subjects: “…Ecological Security Pattern…”
Get full text
Article -
1682
Blockchain-Assisted Hierarchical Attribute-Based Encryption Scheme for Secure Information Sharing in Industrial Internet of Things
Published 2024-01-01“…The analyses and experimental findings show that the proposed blockchain-integrated edge computing architecture is better than the existing schemes in terms of data sharing, data privacy, and security.…”
Get full text
Article -
1683
Application of Image Denoising Method Based on Two-Way Coupling Diffusion Equation in Public Security Forensics
Published 2021-01-01“…The problem of diversification of the use and application modes of multiple police types is solved; the video image evidence is managed in a centralized storage, audit, and export method, and the security and authenticity of the evidence are solved. …”
Get full text
Article -
1684
Systems Thinking Safety Analysis: Nuclear Security Assessment of Physical Protection System in Nuclear Power Plants
Published 2013-01-01“…The dynamical assessment has been performed in the aspect of the nuclear power plants (NPPs) security. The physical protection system (PPS) is constructed by the cyber security evaluation tool (CSET) for the nuclear security assessment. …”
Get full text
Article -
1685
Multi-Functional Reconfigurable Intelligent Surface Assisted Security Communication Systems Under Imperfect CSI of Eavesdroppers
Published 2025-01-01Subjects: “…Physical layer security…”
Get full text
Article -
1686
Temporal Convolutional Network Approach to Secure Open Charge Point Protocol (OCPP) in Electric Vehicle Charging
Published 2025-01-01“…Securing data transactions across computer networks presents significant challenges, particularly concerning data privacy and cybersecurity threats. …”
Get full text
Article -
1687
Singapore Government Securitization Measures against Transboundary Haze Pollution as a Non-Traditional Security Threat
Published 2025-01-01“…It can be inferred that the government possesses complete authority to secure the smog issue. The community's response is critical in determining the success of haze securitization. …”
Get full text
Article -
1688
Research and application of 5G cloud-network-edge-end integrated in-depth security protection system
Published 2022-10-01“…A 5G cloud-network-edge-end integrated in-depth security protection implementation scheme was innovatively proposed, the network security protection system of 5G customized network was explored, and the basic architecture, characteristics, implementation scheme and application effect of the system were introduced.In the implementation plan, two key points were emphasized.Firstly, by deploying the security system of the four aspects of the 5G cloud network, the edge and the end, the multi-level and multi-dimensional security protection capability was formed.Secondly, the operation process of the adaptation system, including one-key reinforcement, security defense, situational awareness and one-key emergency response was established.Finally, the practical application effect of the 5G cloud-network-edge-end integrated in-depth security protection system was given.…”
Get full text
Article -
1689
An explanatory case report about critical differences of ‘inability to work’ in Italian welfare and social security systems
Published 2019-03-01“…In Italy, there is a different status of ‘inability to work’ in civil invalidity and INPS social security insurance systems. These differences and overlaps cause some concerns. …”
Get full text
Article -
1690
ECC-Based Authentication Protocol for Military Internet of Drone (IoD): A Holistic Security Framework
Published 2025-01-01Subjects: Get full text
Article -
1691
IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions
Published 2022-07-01“…IET Information Security…”
Get full text
Article -
1692
An Improved Clustering Method for Detection System of Public Security Events Based on Genetic Algorithm and Semisupervised Learning
Published 2017-01-01“…In this paper, a detecting system for public security events is designed, which carries out clustering operation to cluster relevant text data, in order to benefit relevant departments by evaluation and handling. …”
Get full text
Article -
1693
Public-private partnerships in National Security. A case study in the context of the war in Ukraine: 2022-2024
Published 2024-12-01Subjects: Get full text
Article -
1694
WOMEN ORGANIZATIONS, SECURITY AND PEACE-BUILDING IN NIGERIA: AN EXAMINATION OF THE PROGRAMMES AND ACTIVITIES OF EUNICE SPRING OF LIFE FOUNDATION
Published 2023-12-01Subjects: Get full text
Article -
1695
Advancing Passwordless Authentication: A Systematic Review of Methods, Challenges, and Future Directions for Secure User Identity
Published 2025-01-01Subjects: Get full text
Article -
1696
Sql injection detection using Naïve Bayes classifier: A probabilistic approach for web application security
Published 2025-01-01“…A pervasive security issue in web applications is database injection, enabling attackers to alter SQL queries in order to get unauthorized access to confidential information. …”
Get full text
Article -
1697
Explainable artificial intelligence in web phishing classification on secure IoT with cloud-based cyber-physical systems
Published 2025-01-01“…This article develops an Explainable Artificial Intelligence with Aquila Optimization Algorithm in Web Phishing Classification (XAIAOA-WPC) approach on secure Cyber-Physical Systems. The developed XAIAOA-WPC approach mainly emphasizes the effectual classification and recognition of web phishing based on CPS. …”
Get full text
Article -
1698
MP2P high capacity and security resource node selection strategy based on Bayesian game
Published 2016-01-01Subjects: Get full text
Article -
1699
Research on Food Security Risk Assessment and Early Warning in China Based on BP Neural Network Model
Published 2022-01-01“…According to the influencing factors in food security, this paper uses the PCA method and the AHP method to construct a food security early warning index system that includes 4 secondary indicators and 13 tertiary indicators of total security, trade security, ecological security, and food security. …”
Get full text
Article -
1700
A Novel Secure Routing Protocol——Multi-Next Hop Routing Protocl Based on Node Potential
Published 2014-07-01Subjects: “…secure routing…”
Get full text
Article