Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
441
Juridical construction of socio-ecological security: Indonesia’s vulnerability to climate change
Published 2025-01-01“…This research is a normative study that examines the legal framework of socio-ecological security concerning Indonesia’s vulnerability as an archipelagic nation due to the impacts of climate change. …”
Get full text
Article -
442
Analysis of Russian Federation Foreign Policy in the Field of International Information Security
Published 2014-12-01Subjects: “…international information security…”
Get full text
Article -
443
Producing secure multimodal biometric descriptors using artificial neural networks
Published 2021-03-01“…Abstract With the rapidly growing use of biometric authentication systems, the security of these systems and the privacy of users have attracted significant attention in recent years. …”
Get full text
Article -
444
THE EUROPEAN UNION (EU) AND THE CLIMATE-SECURITY NEXUS: CSDP MISSIONS AND OPERATIONS
Published 2022-12-01Subjects: Get full text
Article -
445
Management of labor behavior of employees as a factor of economic security of the organization
Published 2019-09-01Get full text
Article -
446
Digital economic security of Russian organizations, industries and Russia as a whole
Published 2019-09-01Subjects: “…digital economic security of the organization…”
Get full text
Article -
447
Organization of the National Police activities as a subject of the security and defense sector
Published 2022-06-01Subjects: “…security sector…”
Get full text
Article -
448
Energy Efficiency Maximization with Optimal Beamforming in Secure MISO CRNs with SWIPT
Published 2021-01-01Get full text
Article -
449
Health Monitoring System for Nursing Homes with Lightweight Security and Privacy Protection
Published 2017-01-01“…So this paper proposed a health monitoring system with lightweight security and privacy protection for nursing homes. …”
Get full text
Article -
450
Secure Microprocessor-Controlled Prosthetic Leg for Elderly Amputees: Preliminary Results
Published 2011-01-01“…Our artificial knee has been designed to fulfill the specific requirements of this population in terms of capabilities, transfer assistance, security, intuitiveness, simplicity of use, and types of physical activity to be performed. …”
Get full text
Article -
451
Enhancing food and nutrition security in Himalayan foothills with neglected and underutilized millets
Published 2025-01-01Subjects: “…Food security…”
Get full text
Article -
452
Access to Network Login by Three-Factor Authentication for Effective Information Security
Published 2016-01-01“…In this way managing additional secret key includes an additional layer of security.…”
Get full text
Article -
453
Police crime in 1947 in the coverage of the Ukrainian SSR state security agencies
Published 2022-12-01Subjects: Get full text
Article -
454
An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment
Published 2016-01-01“…Cloud computing requires the security upgrade in data transmission approaches. In general, key-based encryption/decryption (symmetric and asymmetric) mechanisms ensure the secure data transfer between the devices. …”
Get full text
Article -
455
Double layer federated security learning architecture for artificial intelligence of things
Published 2024-12-01Subjects: Get full text
Article -
456
A Coverage and Slicing Dependencies Analysis for Seeking Software Security Defects
Published 2014-01-01“…Software security defects have a serious impact on the software quality and reliability. …”
Get full text
Article -
457
Concept of effective Control among the Means of Restoring National Security of Ukraine
Published 2021-07-01Subjects: Get full text
Article -
458
Data-Driven Social Security Event Prediction: Principles, Methods, and Trends
Published 2025-01-01Subjects: Get full text
Article -
459
A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices
Published 2011-01-01“…Next to a FPGA-based hardware architecture, we focus on a secure scheme for key flashing of public keys to highly mobile systems. …”
Get full text
Article -
460
TVD‐PB logic circuit based on camouflaging circuit for IoT security
Published 2022-01-01“…A logic camouflaging circuit is proposed that uses a balanced power consumption and threshold voltage‐defined technique to provide an antiphysical attack scheme to protect the hardware security for IoT devices. The proposed circuit uses a symmetric differential pull‐down network in implementing the different logic functions through the threshold voltage reconfiguration circuit. …”
Get full text
Article