Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1721
-
1722
Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing.
Published 2024-01-01“…Our research aims to prioritise security variables using quantum security criteria, providing an innovative viewpoint on software security evaluation in the quantum computing era.…”
Get full text
Article -
1723
Antenna selection algorithm based on cut-off rate for secure spatial modulation with finite alphabet input
Published 2020-03-01Subjects: “…secure spatial modulation…”
Get full text
Article -
1724
Resource optimization of secure energy efficiency based on mmWave massive MIMO-NOMA system with SWIPT
Published 2020-08-01Subjects: Get full text
Article -
1725
-
1726
Research on Wireless Sensor Network Security Location Based on Received Signal Strength Indicator Sybil Attack
Published 2020-01-01“…This paper studies the security location mechanism of the sensor network node under the attack of Sybil and analyzes the safe attacks which are possibly accepted and safe requirement in the location system. …”
Get full text
Article -
1727
IPTV Service Framework Based on Secure Authentication and Lightweight Content Encryption for Screen-Migration in Cloud Computing
Published 2015-01-01“…A secure authentication for user devices and multimedia protection mechanism is necessary to protect both user devices and IPTV services. …”
Get full text
Article -
1728
Using RES Surpluses to Remove Overburden from Lignite Mines Can Improve the Nation’s Energy Security
Published 2024-12-01Subjects: Get full text
Article -
1729
Climate change–drylands–food security nexus in Africa: From the perspective of technical advances, challenges, and opportunities
Published 2023“…Climate change impacts on drylands pose more vexing risks to socio-ecological systems, resulting in food security issues, biodiversity loss, and livelihood shifts in Africa. …”
Get full text
Article -
1730
Farmers’ Perception of the Impacts of Climate Variability and Change on Food Security in Rubanda District, South Western Uganda
Published 2019Subjects: “…Climate Variability and Change; Food security; Rubanda district; Agricultural production; Farmers’ perception…”
Get full text
Article -
1731
Climate change–Drylands–Food Security Nexus in Africa: From the Perspective of Technical Advances, Challenges, and Opportunities.
Published 2024“…Climate change impacts on drylands pose more vexing risks to socio-ecological systems, resulting in food security issues, biodiversity loss, and livelihood shifts in Africa. …”
Get full text
Article -
1732
Intrinsic assurance: a systematic approach towards extensible cybersecurity
Published 2023-02-01Subjects: Get full text
Article -
1733
Survey on privacy protection indoor positioning
Published 2023-09-01Subjects: Get full text
Article -
1734
The Paradox of Cyber Warfare and Clausewitz’s Conception of War
Published 2025-01-01Subjects: Get full text
Article -
1735
Implementation of stabilisation measures by the National Police in the context of creating a secure environment in the de-occupied and frontline territories
Published 2024-06-01Subjects: “…security…”
Get full text
Article -
1736
Asymmetric proxy re-encryption system achievable for office user to securely sharing outsourcing data of mobile terminal
Published 2016-09-01Subjects: Get full text
Article -
1737
A semi-synchronous federated learning framework with chaos-based encryption for enhanced security in medical image sharing
Published 2025-03-01“…Protecting sensitive health information and promoting clinical research depend on medical data security. This paper suggests an innovative framework that integrates healthcare engineering, chaotic encryption, and artificial intelligence (AI) to address the privacy issue of medical data. …”
Get full text
Article -
1738
Creating a model of threats to Ukraine’s national critical infrastructure as a basis for ensuring its security and resilience
Published 2024-03-01Subjects: Get full text
Article -
1739
Secure two-party line segments intersection scheme and its application in privacy-preserving convex hull intersection
Published 2013-01-01Subjects: Get full text
Article -
1740
SAFE-CAST: secure AI-federated enumeration for clustering-based automated surveillance and trust in machine-to-machine communication
Published 2025-01-01Subjects: Get full text
Article