Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
761
Towards the Integration between IoT and Cloud Computing: An Approach for the Secure Self-Configuration of Embedded Devices
Published 2015-12-01“…The secure boot-up and setup of Internet of Things (IoT) devices connected over the Cloud represent a challenging open issue. …”
Get full text
Article -
762
Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique
Published 2016-01-01“…The data which is stored in the cloud can be sensitive and at times needs a proper file storage system with a tough security algorithm. Whereas cloud is an open shareable elastic environment, it needs impenetrable and airtight security. …”
Get full text
Article -
763
-
764
Personal data security as a form of legal certainty for the fulfillment of consumer rights for online loans
Published 2024-10-01Subjects: “…personal data security, online lending, consumer protection, financial services authority, legal certainty…”
Get full text
Article -
765
Mitigating Software Vulnerabilities through Secure Software Development with a Policy-Driven Waterfall Model
Published 2024-01-01“…For the past few years, software security has become a pressing issue that needs to be addressed during software development. …”
Get full text
Article -
766
-
767
Optimal Joint Defense and Monitoring for Networks Security under Uncertainty: A POMDP-Based Approach
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
768
-
769
Bioinspired Blockchain Framework for Secure and Scalable Wireless Sensor Network Integration in Fog–Cloud Ecosystems
Published 2024-12-01Subjects: Get full text
Article -
770
A study on the impact of accounting information security controls on the effectiveness of internal controls in Vietnamese enterprises
Published 2025-03-01Subjects: “…Accounting information security…”
Get full text
Article -
771
Water insecurity is human: why social science must be at the core of water security research and practice
Published 2025-01-01“…To address this, the emerging science of water security can build on well-established and theoretically-robust findings from social science. …”
Get full text
Article -
772
Assessing the role of local councils in the development of sustainable urban security (Case Study; Urmia City)
Published 2023-06-01“…Conclusions: Based on the Friedman test, among the research items, the second item is "Social Security Development", and the first item is "Economic Security Development". …”
Get full text
Article -
773
The role of international support programmes in global health security capacity building: A scoping review.
Published 2023-01-01“…Large scale public health emergencies such as COVID-19 demonstrate the importance of Global Health Security (GHS) and highlight the necessity of resilient public health systems capable of preparing for, detecting, managing, and recovering from such emergencies. …”
Get full text
Article -
774
THE RELATIONSHIP OF WOMEN WORKERS WITH DEVELOPMENT FROM THE PERSPECTIVE OF GAINING THEIR ECONOMIC FREEDOM AND SECURING THE FUTURE OF THEIR CHILDREN
Published 2023-03-01“…According to the results of the research, it has been detected that the participating women workers entered business life due to compulsory reasons, gained their economic freedom and stood on their own feet, it was effective that they worked to secure the future of their children and earned money, that they loved their job very much and were satisfied with their work. …”
Get full text
Article -
775
Communication and Sensing: Wireless PHY-Layer Threats to Security and Privacy for IoT Systems and Possible Countermeasures
Published 2025-01-01Subjects: Get full text
Article -
776
GEOPOLITICAL VARIATION IN THE REPORTAGE OF SECURITY BY THE NATION AND DAILY TRUST NEWSPAPERS (2010-2020): A PROGNOSIS
Published 2024-07-01Subjects: Get full text
Article -
777
Enhanced airport security screening under fermatean probabilistic hesitant fuzzy hybrid aggregation information
Published 2024-06-01“…Optimizing airport security screening processes is imperative in the modern age, ensuring a delicate balance between stringent security measures and efficient, seamless travel experiences for passengers. …”
Get full text
Article -
778
Introduction of the Project “Community Police Officer” as a Step towards Strengthening Local Security Infrastructure
Published 2020-02-01Subjects: Get full text
Article -
779
Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks
Published 2014-01-01“…In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. …”
Get full text
Article -
780
Clinical Application of Inferior Alveolar Nerve Block Device for Safe and Secure IANB by Any Operator
Published 2023-01-01“…Nevertheless, it is a useful technique for pain control, and a secure IANB offers significant benefits to operators and patients. …”
Get full text
Article