Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
561
Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges
Published 2020-01-01“…Further different issues related specifically to the Internet of Things environment are discussed and the causes and effects pertaining to the security breach for Internet of Things are identified. …”
Get full text
Article -
562
Investigating the security consequences of climate change on Iran with a Good Governance approach
Published 2024-12-01“…Due to its location in low latitudes, Iran is among the countries that has not been spared from the security consequences of climate change. The present study seeks to answer two questions: 1) What are the security consequences of climate change on Iran and which components have the greatest impact on Iran? …”
Get full text
Article -
563
Water Security in the Context of Sustainable Management of Transboundary Water Resources in the Caspian Region
Published 2023-11-01Subjects: “…water security…”
Get full text
Article -
564
Novel Framework for Secure Data Aggregation in Precision Agriculture with Extensive Energy Efficiency
Published 2023-01-01“…Energy-efficient data transmission in PA via sensing technology is possible only when additional security measures are synchronized. Nevertheless, security considerations often introduce additional overhead. …”
Get full text
Article -
565
A Quantitative Risk Evaluation Model for Network Security Based on Body Temperature
Published 2016-01-01“…These days, in allusion to the traditional network security risk evaluation model, which have certain limitations for real-time, accuracy, characterization. …”
Get full text
Article -
566
APPROACH TO ECONOMIC SECURITY ORGANIZATION BASED ON PROBLEM-SOLVING TYPE CLOSED CIRCLE
Published 2016-07-01Subjects: “…economic security of organization…”
Get full text
Article -
567
Design and Implementation of an Ethical AI-Based Teaching Assistant for IoT Security Education
Published 2024-12-01Subjects: Get full text
Article -
568
Double Security Level Protection Based on Chaotic Maps and SVD for Medical Images
Published 2025-01-01Subjects: Get full text
Article -
569
Legal regulation features of legal liability of the Bureau of Economic Security of Ukraine employees
Published 2023-09-01Subjects: Get full text
Article -
570
Designing a security-oriented leadership model of Mazandaran University of Medical Sciences
Published 2024-11-01Subjects: “…security-oriented…”
Get full text
Article -
571
Security and Market Liquidity Enhanced Transactive Energy System for Residential End Users
Published 2025-01-01“…However, TES is facing critical challenges in security and economics. Security concerns include data integrity, authentication, confidentiality, scalability, and privacy, while economic challenges involve penalty reduction and market liquidity. …”
Get full text
Article -
572
Secure Two-Party Decision Tree Classification Based on Function Secret Sharing
Published 2023-01-01“…This paper proposes a novel framework for secure two-party decision tree classification that enables collaborative training and evaluation without leaking sensitive data. …”
Get full text
Article -
573
IoT Firmware Emulation and Its Security Application in Fuzzing: A Critical Revisit
Published 2025-01-01Get full text
Article -
574
Wireless sensor network for fire detection with network coding to improve security and reliability
Published 2025-02-01“…This article proposes a wireless sensor network (WSN) for fire alarm systems that leverages network coding to enhance system reliability and security. The proposed WSN is designed to comply with European standards, with a particular focus on German standards, and enables the deployment of sensor nodes that automatically construct a robust and reliable network. …”
Get full text
Article -
575
Beyond full‐bit secure authenticated encryption without input‐length limitation
Published 2022-07-01Subjects: “…beyond birthday‐bound security…”
Get full text
Article -
576
IMPACT OF ELECTRONIC RECORDS MANAGEMENT SYSTEM ON THE SECURITY OF RECORDS AMONG ADMINISTRATIVE STAFF
Published 2023-12-01Subjects: Get full text
Article -
577
The India-US Security and Defense Cooperation under Narendra Modi: Challenges and Assessments
Published 2024-12-01Subjects: Get full text
Article -
578
An Efficient Secure Data Aggregation Based on Homomorphic Primitives in Wireless Sensor Networks
Published 2014-01-01“…This paper proposes a novel secure data aggregation scheme based on homomorphic primitives in WSNs (abbreviated as SDA-HP). …”
Get full text
Article -
579
FROM THE VIEW OF THE COMMUNIST PARTY OF VIETNAM TO THE PRACTICE OF BUILDING SOCIAL SECURITY IN DANANG
Published 2017-12-01“…This article analyzes the views of the Communist Party of Vietnam on social security implementation in the current period; Analyzes the situation of social security in Danang and thereby suggests some solutions to improve social security for people in Danang city today.…”
Get full text
Article -
580
Balancing act: Europeans' privacy calculus and security concerns in online CSAM detection
Published 2025-01-01Get full text
Article