Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
781
Predictors of food security status among informal caregivers of older adults residing in slums in Ghana
Published 2025-02-01Subjects: “…Food security…”
Get full text
Article -
782
ANATOMY OF CAUSES AND EFFECTS OF THE FARMER-HERDER CONFLICT ON FOOD SECURITY IN BENUE STATE, 2015-2023
Published 2024-05-01Subjects: Get full text
Article -
783
Science and opinion in decision making: A case study of the food security collapse in Sri Lanka
Published 2023-09-01“…Abstract Making decisions related to security, whether at the community, national, or regional level, is a highly intricate task. …”
Get full text
Article -
784
A Review about Internet of Things (IoT) integration with Cloud Computing with a Limelight on Security
Published 2024-01-01Subjects: “…Cloud Computing, IoT, IoT Security, Cyber Security, Cloud Attacks, Cloud Attacks Prevention…”
Get full text
Article -
785
UNCHARTED WATERS: ANALYZING PRESIDENT BUHARI'S DIPLOMATIC ADAPTATIONS TO INTERNATIONAL SECURITY THREATS, 2015-2023
Published 2023-12-01Subjects: Get full text
Article -
786
Angle and Context Free Grammar Based Precarious Node Detection and Secure Data Transmission in MANETs
Published 2016-01-01“…However, it produces additional overhead while securing the network. Hence, a Location and Trust-based secure communication scheme (L&TS) is proposed to overcome this limitation. …”
Get full text
Article -
787
Audit Analysis of Abnormal Behavior of Social Security Fund Based on Adaptive Spectral Clustering Algorithm
Published 2021-01-01“…Abnormal behavior detection of social security funds is a method to analyze large-scale data and find abnormal behavior. …”
Get full text
Article -
788
Multidimensional evaluation of nutritional security policies in the Republic of Moldova: gaps, progress, and alignment with international standards
Published 2025-01-01Subjects: “…nutritional security…”
Get full text
Article -
789
Proper selection of personnel for the Security Service of Ukraine as a prerequisite for the career growth of its employees
Published 2023-09-01Subjects: Get full text
Article -
790
-
791
A Comparative Survey of Centralised and Decentralised Identity Management Systems: Analysing Scalability, Security, and Feasibility
Published 2024-12-01“…Traditional identity management (IdM) solutions based on centralised protocols, such as Lightweight Directory Access Protocol (LDAP) and Security Assertion Markup Language (SAML), are where a central authority manages all the processes. …”
Get full text
Article -
792
The effects of outdated data and outliers on Kenya’s 2019 Global Food Security Index score and rank
Published 2023-03-01Get full text
Article -
793
A Long Shadow of World War II: Development of the National Security Concept in the United States
Published 2020-11-01Subjects: Get full text
Article -
794
Contradictions of Collective Security Model: Modern Historiography on the Evolution of the Versailles System of International Relations in the 1930s
Published 2022-05-01Subjects: “…collective security…”
Get full text
Article -
795
Research on cloud dynamic public key information security based on elliptic curve and primitive Pythagoras
Published 2025-02-01“…In order to solve the problems of key redundancy, transmission and storage security and the difficulty of realizing the one-time-secret mode in image encryption algorithm, this paper proposes a cloud dynamic public key information security scheme based on elliptic curve and primitive Pythagoras. …”
Get full text
Article -
796
The Importance of Security Awareness in Combating Phishing Attacks: A Case Study of Bank Rakyat Indonesia
Published 2024-11-01Subjects: Get full text
Article -
797
Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication
Published 2020-01-01“…Security has become one of the important factors for any network communication and transmission of data packets. …”
Get full text
Article -
798
Oral Health Status and Anxiety Level Amongst the Borderline Security Force Personnel and Their Family Members
Published 2025-02-01“…The primary role of border security personnel is to safeguard borders against illegal trans-border activities during peacetime and provide military support during wartime. …”
Get full text
Article -
799
The Association of Food Security With Hypertensive Disorders of Pregnancy: A National Health Interview Survey Analysis
Published 2025-01-01Subjects: “…food security…”
Get full text
Article -
800
Exploring offshore wind’s potential to enhance energy security in nations with limited land and fuel resources
Published 2025-01-01Subjects: Get full text
Article