Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
541
Enhancing IoT Network Security Through Digital Object Architecture-Based Approaches
Published 2024-03-01“…Furthermore, this study presents a security model that aims to strengthen the resolution system based on data transmission security. …”
Get full text
Article -
542
A scalable framework for secure and reliable wireless-based fog cloud communication
Published 2025-02-01Subjects: “…Fog cloud computing security…”
Get full text
Article -
543
The Long-Term Effects of Reforming Social Security to Relieve Low-Income Households
Published 2021-10-01“…Abstract In this paper, we use a macroeconomic model to evaluate two reform proposals that, first, abolish the exemption from social security contributions for marginal employment (“mini jobs”) and, second, reduce social security contributions for low-income earners. …”
Get full text
Article -
544
Correlation of the terms “social order” and “public order”, “social security” and “public safety”
Published 2024-06-01Subjects: “…national security…”
Get full text
Article -
545
Editorial: Multilevel medical security systems and big data in healthcare: trends and developments
Published 2025-01-01Subjects: “…multilevel medical security systems…”
Get full text
Article -
546
Optimizing Secure AI Lifecycle Model Management With Innovative Generative AI Strategies
Published 2025-01-01Subjects: Get full text
Article -
547
Inter-Cloud Data Security Framework to Build Trust Based on Compliance with Controls
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
548
Federated Reinforcement Learning in Stock Trading Execution: The FPPO Algorithm for Information Security
Published 2025-01-01Get full text
Article -
549
Dual-Mode Encryption for UC-Secure String OT from Learning with Errors
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
550
5G Networks Security Mitigation Model: An ANN-ISM Hybrid Approach
Published 2025-01-01Subjects: Get full text
Article -
551
Gazprom on the European Market: In Search of the Balance between the Principles of Competition and Energy Security
Published 2014-08-01Subjects: Get full text
Article -
552
Security Challenges: Appraisal of Threats to Nigeria’s Sovereignty in the Fourth Republic (1999-2019)
Published 2023-07-01Subjects: Get full text
Article -
553
Assessing the impact of the country’s economic security on export development in the agro-industrial sector
Published 2022-05-01Subjects: Get full text
Article -
554
Protection and Control of the State Border as a Component of Ensuring National Security of Ukraine
Published 2019-09-01Subjects: Get full text
Article -
555
One Year after the Crisis in the Caucasus: Some Рroblems of the European Security
Published 2009-10-01Get full text
Article -
556
Application of human-in-the-loop hybrid augmented intelligence approach in security inspection system
Published 2025-01-01Subjects: Get full text
Article -
557
Advancing Food Security with Farmed Edible Insects: Economic, Social, and Environmental Aspects
Published 2025-01-01Subjects: Get full text
Article -
558
A Game-Based Secure Localization Algorithm for Mobile Wireless Sensor Networks
Published 2015-09-01“…To address these challenges, the paper presents a novel game-based secure localization algorithm. The nodes' strategy level can be indicated through the results of trust evaluation and then by means of constructing reasonable strategy space and payoff function using game theory; all kinds of nodes within the network can achieve the optimal payoffs. …”
Get full text
Article -
559
Concept and Classification of Functions of State Policy in the Field of Ensuring Economic Security of the State
Published 2020-02-01Subjects: “…national security…”
Get full text
Article -
560
A Secure Cooperative Spectrum Sensing Scheme in Mobile Cognitive Radio Networks
Published 2014-06-01“…However, in existing works, the problem of secure CSS in mobile cognitive radio networks (CRNs) has not been well considered yet. …”
Get full text
Article