Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
501
A distributed data secure transmission scheme in wireless sensor network
Published 2017-04-01“…Therefore, it is difficult to ensure security of broadcasting data transferred from a single wireless sensor node to base station. …”
Get full text
Article -
502
An Investigation into Information Security Managerial Practices in Selected Public Sector Organizations.
Published 2023“…The study aims to examine information security managerial practices in organisations. It was guided by three specific objectives: identification of information security practices critical to information assets management; establishment of implementation processes involved in the execution of structured information security governance; and evaluation of policies that influence information security best practices. …”
Get full text
Article -
503
Formation and development of special police units: a retrospective analysis
Published 2024-03-01Subjects: Get full text
Article -
504
Adaptive Security Solutions for NOMA Networks: The Role of DDPG and RIS-Equipped UAVs
Published 2024-11-01Subjects: “…non-orthogonal multiple access, reconfigurable intelligent surface, unmanned aerial vehicles, deep reinforcement learning, deep deterministic policy gradient, physical layer security.…”
Get full text
Article -
505
Improving Network Security: An Intelligent IDS with RNN-LSTM and Grey Wolf Optimization
Published 2024-12-01“…The architecture of this RNN-LSTM with GWO IDS provides capable and responsive intrusion detection, training on previous data to be able to detect new threats. Made for network security by combining deep learning and optimization, tests reached 99.5% accurate. …”
Get full text
Article -
506
Secure UAV-Based System to Detect Small Boats Using Neural Networks
Published 2019-01-01“…Given the high sensitivity of the managed information, the proposed system includes cryptographic protocols to protect the security of communications.…”
Get full text
Article -
507
INTERNAL CONTROL AS A TOOL OF SUPPORT ECONOMIC SECURITY OF THE ORGANIZATION AT THE MICRO LEVEL
Published 2021-04-01Subjects: Get full text
Article -
508
Advanced Approach to Information Security Management System Model for Industrial Control System
Published 2014-01-01“…Therefore, a new information security management system based on confidentiality, integrity, and availability as well as safety is required for ICSs. …”
Get full text
Article -
509
Legal Regulation of Interaction of Security Service of Ukraine with Civil Society in Counteracting Terrorism
Published 2019-09-01“…The comparative legal method of the study analyzes the source base of national law concerning the interaction of the Security Service of Ukraine with civil society in fighting against terrorism. …”
Get full text
Article -
510
THE SECURITY ASPECT OF TURKEY-UNITED STATES RELATIONS: IN SEARCH FOR A NEW MODEL
Published 2016-04-01“…Security cooperation has always been an important aspect of the relations between Turkey and the USA. …”
Get full text
Article -
511
Enhancing concealed object detection in active THz security images with adaptation-YOLO
Published 2025-01-01Subjects: “…Active terahertz (THz) security image…”
Get full text
Article -
512
Aukus (Australia-united kingdom-united states) threat to Indo-pacific security
Published 2024-11-01“…Countries can change their defense budgets based on their assessment of security threats in the region and changes in the balance of power. …”
Get full text
Article -
513
RUS DIŞ POLİTİKASINDA GÜVENLİK FAKTÖRÜ - SECURITY FACTOR IN RUSSIAN FOREIGN POLICY
Published 2019-06-01Subjects: Get full text
Article -
514
Exploiting Dual-Output Programmable Blocks to Balance Secure Dual-Rail Logics
Published 2010-01-01“…However, assessing the security level which can be achieved with them is an important issue, as it is directly related to the suitability to use commercial FPGA instead of proprietary custom FPGA for this kind of protection. …”
Get full text
Article -
515
Relevant Problems of Implementing State Policy in the Field of Ensuring Information Security of Ukraine
Published 2021-07-01Subjects: “…information security…”
Get full text
Article -
516
Livelihood training, food production, and food security among vulnerable communities in Bangladesh
Published 2025-01-01“…Agriculture & Food Security…”
Get full text
Article -
517
Global energy security: new challenges and prospects for Russian-American energy cooperation
Published 2010-08-01Get full text
Article -
518
Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks
Published 2012-11-01“…An overview of supervisory control and data acquisition (SCADA) systems is presented and relevant security concerns are addressed. To secure IP-based SCADA systems, it is vital to implement secure architectures which prevent access to the SCADA from corporate IT, in addition to excellent management practices in managing IP-based networks. …”
Get full text
Article -
519
A secure message-passing framework for inter-vehicular communication using blockchain
Published 2019-02-01“…To address the issues, we proposed a secure distributed message-passing framework that does not require a centralized server, and it rates the credibility of message source using blockchain technology. …”
Get full text
Article -
520
Data Security in Autonomous Driving: Multifaceted Challenges of Technology, Law, and Social Ethics
Published 2024-12-01Subjects: Get full text
Article