Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
661
Traffic-related air pollutants (TRAP) in relation to respiratory symptoms among security guards
Published 2025-01-01“…Occupational lung disease is a significant health concern in Malaysia, which, relatively little research on respiratory issues among Malaysian security personnel. The objective of this study is to evaluate the exposure level of TRAP PM2.5 and respiratory symptoms among security guards. …”
Get full text
Article -
662
China-Pakistan Economic Corridor: Meeting Security Challenges in Balochistan Through Trade and Development
Published 2022-11-01Subjects: Get full text
Article -
663
Balancing on carbon storage and ecological security in urban areas: The case of Dongguan city, China
Published 2025-06-01Subjects: Get full text
Article -
664
Data-driven modeling of background radiation structure utilizing matrix profile in nuclear security
Published 2025-01-01Subjects: Get full text
Article -
665
Improve security monitoring knowledge management in IoT applications based on user behavior analysis
Published 2023-09-01“…Using the proposed method, users can transfer their data to IoT storage servers with more security than similar methods without knowing how and where to store it. …”
Get full text
Article -
666
Secure Image Reconstruction using Deep Learning-based Autoencoder with Integrated Encryption Layers
Published 2024-12-01“… This study presents an autoencoder model designed for secure image reconstruction through the integration of encryption and decryption layers within its framework. …”
Get full text
Article -
667
The politics of gating (A response to Private Security and Public Space by Manzi and Smith-Bowers)
Published 2008-05-01“…Critically then the risk is that ignoring the political and normative aspects of gating, as I believe Manzi and Smith-Bowers do, may lead to further and deeper socio-spatial segregation that itself excludes the voice of social groups least able to challenge or, indeed, reside in gated developments and the additional security that they appear to offer. …”
Get full text
Article -
668
SOCIAL NETS AS A NEW FACTOR OF SYSTEM SECURITY IN RUSSIA IN THE 21ST CENTURY
Published 2016-12-01“…The article analyzes the interconnection of social aspects of the Internet and security issues in Russia. It shows that contemporary realities acquire global network character that has ambivalent impact on the development of civilizational and social interactions. …”
Get full text
Article -
669
Secured Wireless Network Based on a Novel Dual Integrated Neural Network Architecture
Published 2023-01-01“…Owing to the importance of their users, components, and services to our everyday lives, the network must secure all of these. With such a wide range of devices and service types being present in the 5G ecosystem, security issues are now much more prevalent. …”
Get full text
Article -
670
Asymptotic Distribution of Isolated Nodes in Secure Wireless Sensor Networks under Transmission Constraints
Published 2016-01-01“…The Eschenauer-Gligor (EG) key predistribution is regarded as a typical approach to secure communication in wireless sensor networks (WSNs). …”
Get full text
Article -
671
-
672
Toward secure and accountable data transmission in Narrow Band Internet of Things based on blockchain
Published 2019-04-01“…While Narrow Band Internet of Things is gradually designed for commercial applications, it also confronts with several security concerns such as identification and privacy. …”
Get full text
Article -
673
Assessment of the growing demographic threats to economic security in the regions of the North Caucasian Federal District
Published 2023-02-01Subjects: Get full text
Article -
674
Recent Trends in Information and Cyber Security Maturity Assessment: A Systematic Literature Review
Published 2025-01-01Subjects: “…cyber security…”
Get full text
Article -
675
Risk Prediction Algorithm of Social Security Fund Operation Based on RBF Neural Network
Published 2021-01-01“…In order to ensure the benign operation of the social security fund system, it is necessary to understand the social security fund facing all aspects of the risk, more importantly to know the relationship between different risks. …”
Get full text
Article -
676
-
677
NATIONAL SECURITY AND BORDER MANAGEMENT IN WEST AFRICA: A STUDY OF NIGERIA-NIGER RELATIONS
Published 2024-07-01Subjects: “…National Security…”
Get full text
Article -
678
Enhancing Intelligent Transport Systems Through Decentralized Security Frameworks in Vehicle-to-Everything Networks
Published 2025-01-01“…The result is a substantial advancement in securing vehicular networks.…”
Get full text
Article -
679
Providing a customer satisfaction model of non-attendance services in the social security organization
Published 2024-11-01“…AbstractThe purpose of this research is to provide a model of customer satisfaction with non-attendance services in the social security organization. The current research is applicable-developmental in terms of purpose; and descriptive-analytical based on the method. …”
Get full text
Article -
680
Diegif: An efficient and secured DICOM to EGIF conversion framework for confidentiality in machine learning training
Published 2025-03-01“…Medical imaging plays a critical role in contemporary healthcare, although it confronts issues relating to storage, security, and confidentiality in machine learning-based diagnostic systems. …”
Get full text
Article