Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1881
A two-tier optimization strategy for feature selection in robust adversarial attack mitigation on internet of things network security
Published 2025-01-01“…Abstract Adversarial attacks were commonly considered in computer vision (CV), but their effect on network security apps rests in the field of open investigation. …”
Get full text
Article -
1882
An Efficient Cluster-Based Mutual Authentication and Key Update Protocol for Secure Internet of Vehicles in 5G Sensor Networks
Published 2025-01-01Subjects: Get full text
Article -
1883
Cost-Effective and Energy-Efficient Photonics-Based Frequency Hopping by Single Wavelength-Tunable Laser for Secure THz Communication
Published 2025-01-01“…A photomixing-based frequency-hopping spread spectrum (FHSS) system is effective for future secure terahertz (THz) wireless communications. Conventional photomixing systems are typically composed of two lasers, which result in an increased system size and power consumption. …”
Get full text
Article -
1884
Environmental Contribution to the Effectiveness of Food Security Policy Implementation as A Rehabilitation Effort for Stunting Treatment in Rokan Hilir Regency
Published 2025-01-01“…According to SDGs 2030, food security must have 3 principles, namely; Availability, Affordability; and Benefits, hereinafter referred to as food security aspects. …”
Get full text
Article -
1885
Leveraging artificial intelligence and advanced food processing techniques for enhanced food safety, quality, and security: a comprehensive review
Published 2025-01-01“…Furthermore, AI addresses food security by enabling resource-efficient agriculture, yield forecasting, and supply chain optimization to ensure the availability and accessibility of nutritious food resources. …”
Get full text
Article -
1886
-
1887
Participants’ satisfaction with social security is closely associated with their acceptance of vulnerable groups: a nationwide cross-sectional study in China
Published 2025-01-01Subjects: “…social security…”
Get full text
Article -
1888
Underutilized and neglected crop species and their role in enhancing household food security amid climate change, Wolaita Zone, Ethiopia
Published 2025-02-01Subjects: Get full text
Article -
1889
Intersections of Middle East Crises and African Stability: Assessing the Impact of Regional Conflicts on Peace and Security in Sub-Saharan Africa
Published 2024-12-01“… This article examines regional crises and conflicts in the Middle East and Africa, assessing their impact on stability and security in a comparative perspective. It focuses on identifying common and specific elements in the structure of conflicts in the Middle East, such as the civil war in Syria and the Yemeni crisis, as they have far-reaching consequences beyond their immediate regions, significantly affecting the political, economic and security dynamics of sub-Saharan Africa. …”
Get full text
Article -
1890
The Effect of Alcoholism on Food Security in Rural Areas: A Case Study of Bufundi Sub-County Rubanda District Uganda.
Published 2023Subjects: Get full text
Thesis -
1891
A Secure Application for Information Sharing i n Organizations: A Case Study of Kabale District Local Government
Published 2019Subjects: “…A secure Application; Information Sharing; organizations; Crypto-graphical Methods…”
Get full text
Article -
1892
Research on cloud computing users’ public safety trust model based on scorecard-random forest
Published 2018-05-01Subjects: “…cloud computing security…”
Get full text
Article -
1893
Legal bases for counteracting financial terrorism
Published 2021-09-01Subjects: “…economic security…”
Get full text
Article -
1894
HTTP behavior characteristics generation and extraction approach for Android malware
Published 2016-08-01Subjects: Get full text
Article -
1895
-
1896
Design of multi-key encryption method
Published 2020-11-01Subjects: “…information security…”
Get full text
Article -
1897
-
1898
A lightweight and trusted communication protocol for IoT
Published 2021-11-01Subjects: Get full text
Article -
1899
Exposição Universal 2015: luzes e sombras sobre a insegurança e a ajuda alimentar na Europa
Published 2017-01-01Subjects: Get full text
Article -
1900
Terrorismo extremo e os tensionamentos nas democracias
Published 2005-01-01Subjects: Get full text
Article