Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
621
Transitional justice mechanisms and processes: international experience for restoring Ukraine’s sovereignty and national security
Published 2023-09-01Subjects: “…security…”
Get full text
Article -
622
Assessment of the food security level in the regions of the European North of Russia based on benchmarking methodology
Published 2020-12-01Subjects: Get full text
Article -
623
-
624
Statistical Characteristics and Security Analysis over Multi-Cascade κ-μ Shadowed Channels
Published 2022-01-01“…Moreover, we further utilize the two performance evaluation metrics including outage probability and intercept probability to investigate the impacts of cascade number and channel parameters on reliability and security. Finally, the theoretical results are consistent with the simulations, proving the correctness of the derivation. …”
Get full text
Article -
625
HREATS OF ECONOMIC SECURITY OF INDUSTRIAL ORGANIZATIONS WHILE PROVIDING EQUIPMENT IN THE CONDITIONS OF IMPORT SUBSTITUTION
Published 2017-09-01Subjects: Get full text
Article -
626
APPLICATION OF A METHOD OF LINEAR CONVOLUTION OF CRITERIA BY OPTIMIZATION OF FINANCIAL SECURITY OF ACTIVITY OF THE ORGANIZATION
Published 2017-01-01Subjects: “…optimization of financial security…”
Get full text
Article -
627
The evolution of the Gulf Coopera-tion Council approaches to security issues after the Arab Spring
Published 2022-01-01Subjects: Get full text
Article -
628
Delay-Tolerant, Low-Power Protocols for Large Security-Critical Wireless Sensor Networks
Published 2012-01-01“…This paper reports the analysis, implementation, and experimental testing of a delay-tolerant and energy-aware protocol for a wireless sensor node, oriented to security applications. The solution proposed takes advantages from different domains considering as a guideline the low power consumption and facing the problems of seamless and lossy connectivity offered by the wireless medium along with very limited resources offered by a wireless network node. …”
Get full text
Article -
629
A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment
Published 2013-03-01“…This paper identifies vulnerabilities responsible for well-known network based attacks on cloud and does a critical analysis on the security measures available in cloud environment. This paper focuses on a nonconventional technique for securing cloud network from malicious insiders and outsiders with the use of network profiling. …”
Get full text
Article -
630
The politics of gating (A response to Private Security and Public Space by Manzi and Smith-Bowers)
Published 2008-05-01“…Critically then the risk is that ignoring the political and normative aspects of gating, as I believe Manzi and Smith-Bowers do, may lead to further and deeper socio-spatial segregation that itself excludes the voice of social groups least able to challenge or, indeed, reside in gated developments and the additional security that they appear to offer. …”
Get full text
Article -
631
Transformation of the fuel and energy complex to ensure Russia’s energy security in the era of sanctions restrictions
Published 2023-11-01Subjects: Get full text
Article -
632
Organizational Flexibility and Financial Performance: A Case Study of Social Security Branches in Tehran
Published 2021-05-01Subjects: Get full text
Article -
633
Water security in North Carolina’s most economically insecure county: a case study
Published 2025-01-01Subjects: “…water security…”
Get full text
Article -
634
Impact of Fisheries Exports on the Participation of Fisheries in Ensuring Food Security of the Country and the Arctic Region
Published 2024-12-01Subjects: Get full text
Article -
635
Text Categorization Approach for Secure Design Pattern Selection Using Software Requirement Specification
Published 2018-01-01Subjects: Get full text
Article -
636
Advanced Malware Detection: Integrating Convolutional Neural Networks with LSTM RNNs for Enhanced Security
Published 2024-12-01Get full text
Article -
637
Evaluation of the policy program for strengthening local food commodities for sustainable food security in papua
Published 2024-06-01Subjects: Get full text
Article -
638
-
639
Water management for rice production: a key component of food security in East Africa
Published 2025-02-01“…Abstract Water is a valuable resource for rice production, which is an integral component of food security in East Africa (EA). Rice farming is expanding in the region, with up to 90% produced on smallholder farms using traditional flooding and rain-fed methods, vulnerable to climate change and variability. …”
Get full text
Article -
640