Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
521
The India-US Security and Defense Cooperation under Narendra Modi: Challenges and Assessments
Published 2024-12-01Subjects: Get full text
Article -
522
Secure contact tracing platform from simplest private set intersection cardinality
Published 2022-09-01“…IET Information Security…”
Get full text
Article -
523
Integration of Islamic Jurisprudence Principles within the UN Global Human Security Framework
Published 2024-12-01Subjects: Get full text
Article -
524
A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization
Published 2015-02-01“…Recently, the development of smart phones has been reported the number of security vulnerabilities. Although these smart phones have a concept of Sandbox for the security, sensitive personal information has been still exposed by internal data exchange or root privilege acquisition. …”
Get full text
Article -
525
The organisational structure of the economic security service of the enterprise and the main functions of its divisions
Published 2022-07-01Subjects: Get full text
Article -
526
Cyber Security of the Economy and Public Finances: Historiography and Post-War Trajectory of Development
Published 2024-06-01Subjects: Get full text
Article -
527
NON-CONTRIBUTORY SOCIAL SECURITY APPLICATION FOR ELDERLY AND INDIVIDUALS WITH DISABILITIES’: THE CASE OF TURKEY
Published 2021-11-01Subjects: “…social security…”
Get full text
Article -
528
An Experimental Realization of a Chaos-Based Secure Communication Using Arduino Microcontrollers
Published 2015-01-01“…Security and secrecy are some of the important concerns in the communications world. …”
Get full text
Article -
529
A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
Published 2025-01-01“…To analyze the efficiency of these algorithms, a comparative study was conducted using crucial factors, including security, secrecy, and integrity. The assessment also examines known flaws and prospective attacks for each algorithm and highlights current methods and future research gaps. …”
Get full text
Article -
530
Securing Brain-to-Brain Communication Channels Using Adversarial Training on SSVEP EEG
Published 2025-01-01Subjects: Get full text
Article -
531
Blockchain-powered wireless sensor networks: enhancing security and privacy in the IoT era
Published 2023-06-01Subjects: Get full text
Article -
532
NATO’s partnership policy: From the military alliance to the security community, and back again
Published 2024-07-01Subjects: Get full text
Article -
533
Towards Understanding the Security of Modern Image Captchas and Underground Captcha-Solving Services
Published 2019-06-01Subjects: Get full text
Article -
534
MANAGEMENT OF THE QUALITY OF AGRICULTURAL PRODUCTS IN THE AGRARIAN AI ECONOMY IN SUPPORT OF FOOD SECURITY
Published 2025-03-01Subjects: Get full text
Article -
535
Intensified Drought Threatens Future Food Security in Major Food-Producing Countries
Published 2024-12-01Subjects: “…food security…”
Get full text
Article -
536
-
537
DYSSS: A Dynamic and Context-Aware Security System for Shared Sensor Networks
Published 2015-11-01“…In this work we propose a Dynamic Security System to be applied in the shared sensor network context. …”
Get full text
Article -
538
Secure and Efficient Cluster-Based Range Query Processing in Wireless Sensor Networks
Published 2018-01-01“…To deal with this problem, we propose a secure and efficient scheme for cluster-based query processing in wireless sensor networks. …”
Get full text
Article -
539
Securing fingerprint templates by enhanced minutiae‐based encoding scheme in Fuzzy Commitment
Published 2021-05-01“…IET Information Security…”
Get full text
Article -
540
Instruction and demonstration-based secure service attribute generation mechanism for textual data
Published 2024-12-01“…Attribute-based access control is fundamentally dependent on the secure service attribute calibration of object sources. …”
Get full text
Article