Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1741
Systematic Review of Usability Factors, Models, and Frameworks with Blockchain Integration for Secure Mobile Health (mHealth) Applications
Published 2024-12-01“…Blockchain integration emerged as a promising approach to improve data security, interoperability, and user trust, particularly for older adults who engage with complex, multimodal health data. …”
Get full text
Article -
1742
Resilience and strategic management: ways to ensure economic and social security of Ukrainian enterprises during long-term warfare
Published 2024-12-01Subjects: “…Social security…”
Get full text
Article -
1743
Application research of distribution network based on quantum secure communication and 5G hard-slicing private network
Published 2022-01-01Subjects: Get full text
Article -
1744
Deep reinforcement learning based algorithm for real-time QoS optimization of software-defined security middle platform
Published 2023-05-01Subjects: “…software defined security…”
Get full text
Article -
1745
Systems resource allocation algorithm for RIS-assisted D2D secure communication based on parallel CNN
Published 2022-03-01“…To meet the requirements of intelligent signal processing and physical layer security, aiming at the shortage of spectrum resources, a resource allocation algorithm for reconfigurable intelligent surface (RIS)-assisted the device to device (D2D) communication was proposed.D2D users communicated by multiplexing the spectrum resources of cellular users.Considering the constraints of D2D transmission rate, base station transmission power and RIS transmission phase shift, the problem of maximizing user security rate was formulated.To solve the nonlinear programming problem, a parallel convolutional neural network (CNN) algorithm was proposed to obtain the optimal resource allocation scheme.Simulation results show that the parallel CNN algorithm can effectively improve the secrecy rate and it is significantly better than other benchmark algorithms.…”
Get full text
Article -
1746
Harnessing the potential of shared data in a secure, inclusive, and resilient manner via multi-key homomorphic encryption
Published 2024-06-01“…Using the AI4I public predictive maintenance dataset, we demonstrate the MK-HELR algorithm, setting the stage for further research in secure, dynamic, and collaborative multi-party learning scenarios.…”
Get full text
Article -
1747
Si Substrate Backside—An Emerging Physical Attack Surface for Secure ICs in Flip Chip Packaging
Published 2024-01-01Subjects: Get full text
Article -
1748
Optimal Information Hiding: Advanced Bitstream-Based Watermarking for Secure and Efficient Integration of Image Data in Digital Videos
Published 2024-01-01“…The outcomes underscore its practical viability for copyright protection, contributing to a more secure digital media landscape.…”
Get full text
Article -
1749
Security-reliability tradeoff scheme for cognitive relay networks with eavesdropping attack over Nakagami-m fading channels
Published 2018-12-01Subjects: Get full text
Article -
1750
EMPOWERMENT STRATEGY THROUGH THE ROLE OF THE TERRITORIAL TASK FORCE IN HANDLING SOCIAL AND SECURITY CONFLICT IN PUNCAK JAYA DISTRICT
Published 2024-12-01“…This research aims to analyze the strategy for empowering the Papua defense region through the role of the Territorial Task Force in handling social and security conflicts in Puncak Jaya Regency. This research uses Strategy theory according to Thomas Schelling, namely management instruments for survival and winning competition. …”
Get full text
Article -
1751
EFFECT OF TRAINING ON CAREER PERFORMANCE OF NIGERIA SECURITY AND CIVIL DEFENSE CORPS (NSCDC) PERSONNEL IN KADUNA STATE COMMAND
Published 2022-12-01“…It recommended among others that the NSCDC as a security organization should organize training on regular basis to improve the career performance of personnel of their organization in view of the current security challenges facing the country. …”
Get full text
Article -
1752
Evaluation method for information security capability of mobile phone user based on behavior ontology under unconscious condition
Published 2016-10-01Subjects: “…security behavior ontology…”
Get full text
Article -
1753
A Federated Learning Framework for Enhanced Data Security and Cyber Intrusion Detection in Distributed Network of Underwater Drones
Published 2025-01-01“…This approach significantly improves data security by ensuring that sensitive information never leaves the local devices, reducing the risk of interception or compromise during transmission. …”
Get full text
Article -
1754
EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks
Published 2024-12-01“…We also create an access control system based on smart contracts and a secure multi-party computing protocol for model updates. …”
Get full text
Article -
1755
Optimal Connection of Offshore Wind Farm with Maximization of Wind Capacity to Power Systems considering Losses and Security Constraints
Published 2019-01-01“…The objective of this work is to present a methodology to determine the optimal OWF connection point in a power system, with maximum penetration of firm wind power and minimum loss, considering security constraints related to the “N−1” contingency criterion, exchange limits between areas, and a strategy to reduce the number of constraints in the optimization problem. …”
Get full text
Article -
1756
Legal basis for ensuring public security and order at the regional level and the place of administrative and legal norms among them
Published 2022-12-01Subjects: Get full text
Article -
1757
-
1758
-
1759
Design of a tensile-type 3-D multi-scroll chaotic system and its application in secure communication
Published 2016-12-01Subjects: Get full text
Article -
1760
Secure lossless transmission of correlated sources over noisy broadcast channel using separate source-channel coding
Published 2013-10-01Subjects: Get full text
Article