Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
381
SECURITY OF LIVES, RIGHTS TO PEACEFUL ASSEMBLY AND THE ENDSARS PROTEST IN NIGERIA
Published 2023-07-01Subjects: “…Human Security…”
Get full text
Article -
382
Verification of serialising instructions for security against transient execution attacks
Published 2023-07-01“…However, errors and Trojans in the hardware implementation of lfence can be exploited to compromise the software mitigations that use lfence. The aforementioned security gap has not been identified and addressed previously. …”
Get full text
Article -
383
THE U.S. NATIONAL SECURITY COUNCIL IN CONTEMPORARY AMERICAN INTERNATIONAL STUDIES
Published 2016-08-01Subjects: Get full text
Article -
384
Aggregation Scheme with Secure Hierarchical Clustering for Wireless Sensor Networks
Published 2012-07-01“…Due to our IP naming rules and type 1 nodes as cluster heads, public key cryptography, such as RSA (Rivest, Shamir, Adleman), or ECC (Elliptic Curve Cryptosystem), is easily implanted to our system to strengthen our security. The sink node is the only certification authority in our system, but n level cluster heads can be extended to n level certification authorities if needed, where n is maximum number of level.…”
Get full text
Article -
385
Security environment of the state in the context of the Ministry of Internal Affairs of Ukraine activities
Published 2023-06-01Subjects: “…security…”
Get full text
Article -
386
Enhancing Security in International Data Spaces: A STRIDE Framework Approach
Published 2024-12-01“…Regulatory and technological frameworks such as International Data Spaces (IDS) have been developed to facilitate secure data exchange while integrating security and data sovereignty aspects required by laws and regulations, such as the GDPR and NIS2. …”
Get full text
Article -
387
Enhanced Lightweight Quantum Key Distribution Protocol for Improved Efficiency and Security
Published 2025-01-01“…Quantum Key Distribution (QKD) provides secure communication by leveraging quantum mechanics, with the BB84 protocol being one of its most widely adopted implementations. …”
Get full text
Article -
388
A Security Authentication Protocol for Trusted Domains in an Autonomous Decentralized System
Published 2016-03-01“…By applying BAN predicate logic and AVISPA security analysis tool of network interaction protocol, we can guarantee protocol security and provide complete safety tests. …”
Get full text
Article -
389
An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security
Published 2023-09-01“…However, IIoT involves some security vulnerabilities that are more damaging than those of IoT. …”
Get full text
Article -
390
Crop Diversification for Ensuring Sustainable Agriculture, Risk Management and Food Security
Published 2025-02-01Subjects: Get full text
Article -
391
Problems of the Use of Private Military and Security Companies in the US military operations
Published 2010-06-01Get full text
Article -
392
Climate change, economic security, and macroeconomic stability: Insights from the EU
Published 2025-01-01“…This research examines the impact of climate change risks on the macroeconomic situation and the security of the economic system in the EU-27 during the 2002-2020 period. …”
Get full text
Article -
393
A blockchain-based secure path planning in UAVs communication network
Published 2025-02-01Subjects: Get full text
Article -
394
TRANS-BORDER TRAJECTORIES AND HUMAN SECURITY IN NIGERIA: NORTHEAST AND NORTHWEST IN PERSPECTIVE
Published 2023-12-01Subjects: Get full text
Article -
395
The Russian Federation subjects budgets as a financial basis for their economic security
Published 2022-11-01Subjects: Get full text
Article -
396
Secure Pesticide Storage: Essential Structural Features of a Storage Building
Published 2004-10-01Get full text
Article -
397
HERDSMEN AND FARMERS CLASHES IN NORTH CENTRAL NIGERIA: NATIONAL SECURITY IMPLICATIONS
Published 2024-07-01“…This paper examines the national security implications of herdsmen and farmers conflict on Nigerian national security. …”
Get full text
Article -
398
To the problem of optimization of criteria for evaluating the effectiveness of providing the national security of the State
Published 2022-03-01Subjects: Get full text
Article -
399
A reference measurement framework of software security product quality (SPQNFSR)
Published 2021-01-01Subjects: Get full text
Article -
400
HUMAN RIGHTS AND NATIONAL SECURITY: FRANCE IN SEARCH OF THE RESOLUTION OF THE MIGRATION CRISIS
Published 2018-07-01Subjects: Get full text
Article