Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
581
-
582
Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device
Published 2014-01-01“…In this paper, we propose the secure locking screen using time pattern (SLSTP) focusing on improved security and convenience for users to support human-centric multimedia device completely. …”
Get full text
Article -
583
Optimal defense strategy based on the mean field game model for cyber security
Published 2019-02-01“…With the evolution of research on defense strategies in cyber security, the choice of an optimal strategy has become a key problem in current studies. …”
Get full text
Article -
584
AI-based model for securing cognitive IoT devices in advance communication systems
Published 2025-12-01“…These security challenges are exacerbated by IoT devices’ limited computational resources and storage capacities, rendering traditional security protocols ineffective. …”
Get full text
Article -
585
Designing an internet of things laboratory to improve student understanding of secure IoT systems
Published 2024-01-01“…The instructional lab material has been uploaded to the web portal https://clark.center designated by the National Security Agency for dissemination. Our approach, design, and experimental validation methodology will be useful for educators, researchers, students, and organizations interested in re-skilling their workforce.…”
Get full text
Article -
586
TECHNICAL EDUCATION AS A PANACEA FOR CURBING BANDITRY AND SECURITY CHALLENGES IN NORTHWEST NIGERIA
Published 2025-01-01Subjects: Get full text
Article -
587
Privacy-preserving ADP for secure tracking control of AVRs against unreliable communication
Published 2025-01-01Get full text
Article -
588
Management of receivables and payables as an element of ensuring the economic security of an enterprise: practical aspects
Published 2023-02-01Subjects: Get full text
Article -
589
Economic security as a driver of Russian exclave development in alignment with national interests
Published 2024-01-01Subjects: “…economic security…”
Get full text
Article -
590
Securing Maritime Autonomous Surface Ships: Cyber Threat Scenarios and Testbed Validation
Published 2025-01-01Get full text
Article -
591
An Analysis of the Impact of the Syrian Crisis on Turkey’s Politic-Military, Social and Economic Security
Published 2020-06-01Subjects: Get full text
Article -
592
Consequences of changing regional integration on environmental development, agricultural markets, and food security
Published 2023-10-01Subjects: Get full text
Article -
593
Business or Security? Goals and Decision-Making Inside the French Oil Policy of the 1920s
Published 2022-03-01Subjects: Get full text
Article -
594
-
595
Legal support for information security of legal entities under Lithuanian and Ukrainian legislation
Published 2023-12-01Subjects: “…information security…”
Get full text
Article -
596
CYBER SECURITY ANALYSIS OF IOT DEVICES TRANSMITTING DATA IN THE THINGSPEAK PLATFORM CLOUD
Published 2022-10-01Subjects: “…IoT security, sniffing IoT attacks, ThingSpeak, IoT, IoT attacks…”
Get full text
Article -
597
A Secure and Robust Machine Learning Model for Intrusion Detection in Internet of Vehicles
Published 2025-01-01“…Although these technologies provide unparalleled connectivity and communication capabilities, they also introduce new security challenges, particularly in terms of Intrusion Detection. …”
Get full text
Article -
598
Eucalyptus-based livelihoods: enhancing household food security and resilience in Northwest Ethiopia
Published 2025-02-01“…Farmers in northwest Ethiopia have been transforming their livelihood strategies, however, the impact of this transformation on food security status and resilience is hardly investigated. …”
Get full text
Article -
599
Monitoring Brazilian Food Security Based on Emergy Concepts: A Proposed Approach
Published 2024-12-01“…This study enhances the discussion on food security by examining trade equity between food consumers and the supply chain from an emergy perspective. …”
Get full text
Article -
600
Problems of Designing Complex Information Security System for Cloud Resources in the Republic of Belarus
Published 2021-10-01Subjects: Get full text
Article