Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
301
Literature Review of Machine Learning and Threat Intelligence in Cloud Security
Published 2025-01-01Subjects: Get full text
Article -
302
SPECIFICS TAIL RISKS THAT THREATEN ECONOMIC SECURITY OF INDUSTRIAL ORGANIZATIONS
Published 2017-02-01Subjects: Get full text
Article -
303
Ritual as mechanism for securing life and averting evil among the Krobo
Published 2008-06-01“…Two of the many functions of rituals are to secure blessings from the deity or to ward off evil. …”
Get full text
Article -
304
Reputation-Based Secure Sensor Localization in Wireless Sensor Networks
Published 2014-01-01“…In this paper, we propose a reputation-based security scheme for sensor localization to improve the security and the accuracy of sensor localization in hostile or untrusted environments. …”
Get full text
Article -
305
UK in European Security: New Opportunities or a Path to Nowhere?
Published 2015-04-01Subjects: Get full text
Article -
306
A secure method of voting and planning based on quadratic voting
Published 2025-02-01“…This method combines the voting and planning, and gives the ability to voters to express their opinions about the candidates programs in addition to voting. Then, a secure electronic voting protocol is proposed for implementing our method. …”
Get full text
Article -
307
Ubiquitous Systems towards Green, Sustainable, and Secured Smart Environment
Published 2015-01-01Get full text
Article -
308
STATISTICAL ANALYSIS THE FOOD SECURITY OF THE RUSSIAN FEDERATION IN THE REGIONAL CONTEXT
Published 2017-02-01Subjects: “…food security…”
Get full text
Article -
309
Mechanisms of Public Administration to Ensure Investment and Innovation Security of Territories
Published 2024-06-01“…The article analyzes the essence of the phenomenon of investment and innovation security, on the basis of which a qualitative assessment of the limits of the functionality of investment and innovation activities as components of economic security is formed. …”
Get full text
Article -
310
Methodology and software development for auditing information security management systems
Published 2022-12-01Subjects: Get full text
Article -
311
A Novel Authentication Management for the Data Security of Smart Grid
Published 2024-01-01Subjects: Get full text
Article -
312
THE RISE OF ETHNIC MILITIA, BANDITRY AND IMPLICATION ON NATIONAL SECURITY IN NIGERIA
Published 2022-05-01Subjects: Get full text
Article -
313
Cumulated Checksum and Dynamic Addresses for Secure Wireless Sensor Networks
Published 2016-07-01“…In this paper, we argue that the long-hold design principles of data link layer protocols are unreasonable from the perspective of wireless security. A secure ARQ scheme for wireless sensor networks named Sec-ARQ is proposed. …”
Get full text
Article -
314
The Security Needs of International Students: An Analysis in Terms of the Securitization Theory
Published 2023-06-01“…In some states, these students are considered a potential threat to national security and subject to various inequalities of opportunity, however, ironically, the states do not adequately address the higher education policies regarding the security needs of international students. …”
Get full text
Article -
315
Main threats to the state’s interests in the sphere of information security of Ukraine
Published 2024-03-01Subjects: “…information security…”
Get full text
Article -
316
Load-Balanced Secure Routing Protocol for Wireless Sensor Networks
Published 2013-06-01“…To solve the problems of limited energy of the nodes and security of routing in wireless sensor networks, load-balanced secure routing protocol (LSRP), a load-balanced secure routing protocol for wireless sensor networks, is proposed. …”
Get full text
Article -
317
The National Police of Ukraine activities in the sphere of ensuring national security
Published 2023-07-01Subjects: Get full text
Article -
318
IMPACT ASSESSMENT OF NIGERIA POLICE FORCE ON THE SECURITY MAINTANANCE IN NIGERIA
Published 2024-06-01Subjects: “…Security…”
Get full text
Article -
319
A New Data Coding Algorithm for Secure Communication of Image
Published 2024-11-01“…This paper proposes a new entropy-sensitive based data coding algorithm for the secure communication of image information between transceiver systems. …”
Get full text
Article -
320
Formal Security in the Works of Legal Scholars of Pre-Soviet Period
Published 2021-07-01Subjects: “…formal security…”
Get full text
Article