Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1801
Empowering Security Operation Center With Artificial Intelligence and Machine Learning—A Systematic Literature Review
Published 2025-01-01Subjects: Get full text
Article -
1802
Ensuring Africa’s Food Security by 2050: The Role of Population Growth, Climate-Resilient Strategies, and Putative Pathways to Resilience
Published 2025-01-01Subjects: “…food security…”
Get full text
Article -
1803
A Novel Security Methodology for Smart Grids: A Case Study of Microcomputer-Based Encryption for PMU Devices
Published 2021-01-01“…In this study, a two-way secure communication methodology underpinned by a chaos-based encryption algorithm for PMU devices is proposed. …”
Get full text
Article -
1804
“An Endless Cycle of Worry and Hardship”: The Impact of COVID-19 on the Food Security of Somali Migrants and Refugees in Nairobi, Kenya
Published 2025-01-01“…Based on the results of a household survey and in-depth interviews with Somali migrants in Nairobi, Kenya in August 2022, this study documents the pandemic-related experience of these migrants in food access and consumption and assesses the overall impacts of COVID-19 on their food security. This study seeks to contribute to the emerging body of case study evidence that assesses the food security outcomes of the pandemic in vulnerable populations. …”
Get full text
Article -
1805
-
1806
Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models
Published 2024-01-01Subjects: Get full text
Article -
1807
Method on Efficient Operation of Multiple Models for Vision-Based In-Flight Risky Behavior Recognition in UAM Safety and Security
Published 2024-01-01“…Recently, with the significant spread of technology in the field of computer vision, research has been conducted to manage passenger safety and security with vision-based approaches. Previous research predominantly focuses on single-task vision models, which limits their ability to comprehensively recognize various situations. …”
Get full text
Article -
1808
-
1809
Changing Diets, Varying Food Consumption Patterns, and Food Security among Recent Zimbabwean Migrants in Windhoek, Namibia
Published 2025-01-01Subjects: “…migration, poverty, food security, dietary changes, food consumption patterns…”
Get full text
Article -
1810
Information Security and Artificial Intelligence–Assisted Diagnosis in an Internet of Medical Thing System (IoMTS)
Published 2024-01-01“…Then, a machine learning - based model was employed to train the encryptor and decryptor for both biosignals and image infosecurity. After secure - data transmission, a case study is conducted for classifying medical images. …”
Get full text
Article -
1811
Criminological examination of law acts and their drafts in the system of measures to combat corruption crime in the security and defense sector of Ukraine
Published 2024-12-01“…The article is devoted to the study of the essence, purpose of criminological examination of regulatory legal acts and their drafts as a tool for combating corruption crime in the security and defense sector of Ukraine. A narrow and broad understanding of the specified examination is proposed. …”
Get full text
Article -
1812
Secured DICOM medical image transition with optimized chaos method for encryption and customized deep learning model for watermarking
Published 2025-04-01“…For healthcare professionals to view patient medical images, a secure online transmitting technique is essential. …”
Get full text
Article -
1813
FEATURES OF THE MODEL OF A SPECIALIZED GEOSPATIAL DATABASE FOR VISUALIZING INDICATORS OF HUMAN SOCIO-ECONOMIC SECURITY IN WARTIME CONDITIONS
Published 2025-01-01Subjects: “…social-economic security…”
Get full text
Article -
1814
Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2X
Published 2023-08-01“…Aiming at the efficiency issue of handover authentication for a large number of vehicles in the 5G-V2X scenario, a secure and efficient group handover authentication protocol based on trajectory prediction was proposed.Firstly, the effect of completing key agreement protocol in advance was achieved by predicting vehicle trajectories.Secondly, vehicles with mobility relevance were treated as the same group through user grouping algorithms, and then all vehicles within the group were batch verified using certificateless aggregation signature technology.In addition, to address the vulnerability of aggregated signature technology to DoS attacks, a binary search method was used to quickly locate malicious users and improve the efficiency of group handover authentication protocol.Finally, the security analysis of the protocol was conducted using the formal verification tool Scyther, and compared with the existing optimal protocol, the computational efficiency is improved by 30%.…”
Get full text
Article -
1815
Physical layer security of full-duplex relay-assisted D2D networks under outdated CSI
Published 2023-03-01Subjects: Get full text
Article -
1816
-
1817
An evaluation method for power supply guarantee capability of multi-city interconnected power system based on security region
Published 2025-01-01Subjects: “…security region…”
Get full text
Article -
1818
Exploring South Africa’s Foreign Policy Objectives in the Decolonisation of the Intergovernmental Organisations: The Case of the United Nations Security Council
Published 2024-10-01“…The United Nations (UN), which is the largest intergovernmental organization (INGO), has a structure mainly focused on global security which is the United Nations Security Council (UNSC). …”
Get full text
Article -
1819
Blockchain-Powered Secure and Scalable Threat Intelligence System With Graph Convolutional Autoencoder and Reinforcement Learning Feedback Loop
Published 2025-01-01“…This paper proposes an approach that integrates secure blockchain technology with data preprocessing, deep learning, and reinforcement learning to enhance threat detection and response capabilities. …”
Get full text
Article -
1820
Analyzes of the effects and security function social capital in sustainable rural border areas the villages of the central city of Saravan
Published 2016-06-01Subjects: Get full text
Article