Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
261
Application of edge computing technology in smart grid data security
Published 2025-02-01“…Absrtact: In order to solve the problem that the two-way flow of power and information between user nodes and service nodes in the smart grid poses a huge threat to the privacy and security of user data, and at the same time, the limitation of the power bureau's computing resources also brings users response delay, service quality degradation and other problems, the author proposes the application of edge computing technology in smart grid data security. …”
Get full text
Article -
262
Energy-Efficient Secure Path Algorithm for Wireless Sensor Networks
Published 2012-04-01“…To prolong the network lifetime, sensor nodes need a secure load-balancing route. In this paper, we investigate the facts of ensuring secure sensed data in a balanced energy network backbone, and propose energy-efficient secure path algorithm (ESPA) for WSNs. …”
Get full text
Article -
263
Blockchain-Based Secure Traceable Scheme for Food Supply Chain
Published 2023-01-01“…The typical food traceability system’s data layer is made up of relational databases managed by core businesses, which cannot ensure data security. It is inefficient and requires a lot of upkeep. …”
Get full text
Article -
264
A neutrosophic framework for evaluating security measures in information systems
Published 2024-11-01Subjects: Get full text
Article -
265
Climate change and agricultural productivity: Economic implications for food security
Published 2024-12-01“…Consequently, it is crucial to assess how the negative effects of climate change can be mitigated to ensure food security. This study evaluated the relationship between agriculture, food security, and CO2 emissions. …”
Get full text
Article -
266
Destabilization of Regional Labour Markets in Ukraineunder Heightened Security Threats
Published 2024-12-01Get full text
Article -
267
Regional and Global dimensions in the complex of problems of security in Southern Caucasus
Published 2011-06-01Get full text
Article -
268
Women’s Role in Violence and UN Women, Peace, and Security Agenda
Published 2024-02-01Subjects: “…the women peace and security agenda…”
Get full text
Article -
269
The Urgency of Job Loss Security Program for the Protection of Human Rights
Published 2024-09-01Subjects: “…job loss security program…”
Get full text
Article -
270
State Participation in Energy Security Provision of the People’s Republic of China
Published 2015-08-01“…The article outlines the contours of energy security of China, the role of major players, including public authorities, government energy corporations, private businesses and the population. …”
Get full text
Article -
271
The evolution of the securities market and modern problems of control of its participants
Published 2022-09-01Subjects: “…securities market…”
Get full text
Article -
272
A statistical approach to the water scarcity implications on food security
Published 2024-11-01“…BACKGROUND AND OBJECTIVES: Jordan faces significant food security challenges due to population growth, climate change, and urbanization, straining limited water resources. …”
Get full text
Article -
273
FSAS: An IoT-Based Security System for Crop Field Storage
Published 2023-01-01“…In this study, we present a remote security management framework for monitoring the crop field storage house, known as the farm security alert system (FSAS). …”
Get full text
Article -
274
FWA-SVM Network Intrusion Identification Technology for Network Security
Published 2025-01-01Subjects: Get full text
Article -
275
Civil substantive and procedural legal means of securing reparations for Ukraine
Published 2023-12-01Get full text
Article -
276
Developing an advanced classifier of threat for security agent behavior models
Published 2019-11-01Get full text
Article -
277
Precision Security: Integrating Video Surveillance with Surrounding Environment Changes
Published 2018-01-01“…Video surveillance plays a vital role in maintaining the social security although, until now, large uncertainty still exists in danger understanding and recognition, which can be partly attributed to intractable environment changes in the backgrounds. …”
Get full text
Article -
278
THE RUSSIAN’S DIGITAL SOVEREIGNTY AS A TECHNICAL BASIS OF INFORMATION SECURITY
Published 2016-12-01Subjects: Get full text
Article -
279
Security mechanisms and data access protocols in innovative wireless networks
Published 2018-09-01Get full text
Article -
280
Application of convolutional neural networks in the intelligence security system subsystem
Published 2020-08-01“…The article proposes the structure of an integrated security system for areal facilities. The main subsystems included in its composition are considered. …”
Get full text
Article