Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
701
ESTIMATION OF ENERGY SECURITY OF AZERBAIJAN REPUBLIC WITH DUE ACCOUNT OF TENDENCY INFLUENCE ON INDICATORS’ CHANGES
Published 2014-02-01Subjects: “…energy security…”
Get full text
Article -
702
Secure Event-Triggered Mechanism for Networked Control Systems under Injection Cyber-Attacks
Published 2022-01-01“…This study focuses on the secure stability issue of networked control systems (NCSs) under injection cyber-attacks (ICAs), which have important research value of applications for network security. …”
Get full text
Article -
703
Armed aggression of the Russian Federation against Ukraine as a threat to the collective security system
Published 2023-03-01Subjects: “…collective security…”
Get full text
Article -
704
Evaluation, Energy Optimization, and Spectrum Analysis of an Artificial Noise Technique to Improve CWSN Security
Published 2013-06-01“…This paper presents the security evaluation, energy consumption optimization, and spectrum scarcity analysis of artificial noise techniques to increase physical-layer security in Cognitive Wireless Sensor Networks (CWSNs). …”
Get full text
Article -
705
Security protection method based on mimic defense and Paillier encryption for smart IoT terminals
Published 2024-12-01“…In particular, the endogenous security and secure transmission issues faced by IoT edge-area smart terminals, due to uncertain threats like unknown vulnerabilities and backdoors, are of considerable concern in the realm of smart IoT. …”
Get full text
Article -
706
Chaotic Stream Cipher-Based Secure Data Communications over Intelligent Transportation Network
Published 2015-01-01“…To address the above security problems, we proposed a chaotic stream cipher-based cryptographic scheme to realise secure data communications over wireless sensor network (WSN), which is a part of ITS. …”
Get full text
Article -
707
Food Acquisition Coping Strategies Vary Based on Food Security Among University Students
Published 2025-01-01“…Results: Despite targeted recruitment efforts, 76% of participants were classified as food secure by the United States Department of Agriculture (USDA) Adult Food Security Survey Module (AFSSM). …”
Get full text
Article -
708
SviaB: Secure and verifiable multi‐instance iris remote authentication using blockchain
Published 2022-01-01“…In a malicious server setting, the server may return an arbitrary result to save computational resources, resulting in a false accept/reject. To address this, secure and verifiable multi‐instance iris authentication using blockchain (SviaB) is proposed. …”
Get full text
Article -
709
A deep learning‐based framework to identify and characterise heterogeneous secure network traffic
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
710
Organized Illegal Migration as Manifestation of Transnational Criminality and Source of Threats to National Security of Ukraine
Published 2021-07-01Subjects: Get full text
Article -
711
JAPANESE DIPLOMACY WITHIN ASEAN REGIONAL FORUM (ARF): SOME ASPECTS OF THE REGIONAL SECURITY
Published 2013-08-01Subjects: Get full text
Article -
712
The Role of the Commercial Space Industry within the US National Security under the Trump Administration
Published 2021-04-01Subjects: Get full text
Article -
713
Cayley–Purser secured communication and jackknife correlative classification for COVID patient data analysis
Published 2025-02-01Subjects: Get full text
Article -
714
A Secure Image Steganography Using Shark Smell Optimization and Edge Detection Technique
Published 2022-10-01Subjects: Get full text
Article -
715
Strategic Health Diplomacy: An Indonesia’s Approach in Securing COVID-19 Booster Vaccine Supplies
Published 2024-06-01“…This study provides an in-depth analysis of Indonesia’s health diplomacy strategy in securing booster vaccines for COVID-19, a critical component in mitigating the impact of the pandemic. …”
Get full text
Article -
716
ECONOMIC SECURITY DOMINANTS OF THE RUSSIAN INDUSTRIAL ORGANIZATIONS WITH PARTICIPATION OF STATE IN CAPITAL: CHRONICLES OF AVTOVAZ
Published 2018-09-01Subjects: Get full text
Article -
717
Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology
Published 2022-01-01“…In order to detect the computer network security technology vulnerabilities due to various factors, the normal operation of the computer network must be ensured, the user’s confidential information must be protected, and it is proposed that the analysis and research on security vulnerability detection must be strengthened. …”
Get full text
Article -
718
THE ROLE OF ENGINEERING PEDAGOGY IN THE SOLUTION OF SECURITY PROBLEMS ON AUTOMOBILE TRANSPORT AND IN THE SPHERE OF ROAD MAINTENANCE
Published 2022-05-01Subjects: Get full text
Article -
719
A Secure Learned Image Codec for Authenticity Verification via Self-Destructive Compression
Published 2025-01-01Subjects: “…secure learned image codec…”
Get full text
Article -
720
Ransomware on cyber-physical systems: Taxonomies, case studies, security gaps, and open challenges
Published 2024-01-01Subjects: Get full text
Article