Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
801
The Relationship between Russian Identity and Political Polarization: The Role of Secure National Identification and National Narcissism
Published 2025-01-01“…</strong>To analyse the relationship between secure national identification and national narcissism with political polarization (intergroup differentiation between people with different political views). …”
Get full text
Article -
802
The effectiveness of monitoring as a necessary condition for the adoption of correct decisions on the security оf technosphere
Published 2020-04-01Subjects: “…security оf technosphere…”
Get full text
Article -
803
An Efficient and Hybrid Deep Learning-Driven Model to Enhance Security and Performance of Healthcare Internet of Things
Published 2025-01-01“…However, H-IoT devices present security and Quality of Service (QoS) concerns because of their critical nature, complexity, and dynamic features, which make them incompatible with conventional network topologies. …”
Get full text
Article -
804
Industrial Pipe-Rack Health Monitoring System Based on Reliable-Secure Wireless Sensor Network
Published 2012-10-01“…However, for the application of WSN technology in large-scale industrial plants, issues of reliability and security should be fully addressed, and an industrial sensor network standard that mitigatesthe problem of compatibilitywith legacy equipment and systems should be established. …”
Get full text
Article -
805
Robust secure design for relay wireless sensor networks with simultaneous wireless information and power transfer
Published 2017-06-01“…In this article, we investigate the physical layer security problem in relay wireless sensor networks with simultaneous wireless information and power transfer. …”
Get full text
Article -
806
Network Architecture, Security Issues, and Hardware Implementation of a Home Area Network for Smart Grid
Published 2012-01-01“…This paper discusses aims, architecture, and security issues of Smart Grid, taking care of the lesson learned at University of Pisa in research projects on smart energy and grid. …”
Get full text
Article -
807
Dynamics of the Indonesian Parliament in Formulating Food Laws to Achieve Food Security at the End of the New Order
Published 2024-07-01Subjects: Get full text
Article -
808
INFLUENCE OF SECURITY CHALLENGES ON STUDENT ACADEMIC PERFORMANCE IN COLLEGE OF EDUCATION BILLIRI, GOMBE STATE, NIGERIA
Published 2024-06-01“…The major recommendations by the researchers are the management of the college are to invest in advanced and reliable security equipment, ensure the presence of adequately trained security personnel and implement comprehensive and effective security policies and procedures and establish counseling and psychological support services to help students manage stress and anxiety related to insecurity. …”
Get full text
Article -
809
Determinants of Rural Household Food Security Status in North Shewa Zone, Amhara Region, Ethiopia
Published 2022-01-01“…This paper used the calorie intake method per day to measure household food security status and a logit model to investigate the determinants of food security. …”
Get full text
Article -
810
A flexible continuous-wave quantum cryptography scheme with zero-trust security for Internet of Things
Published 2022-11-01“…As quantum computing techniques develop rapidly, the security of classical communication, which is usually based on public key encryption algorithm, is under great threat. …”
Get full text
Article -
811
A Survey on Reconfigurable Intelligent Surface for Physical Layer Security of Next-Generation Wireless Communications
Published 2024-01-01Subjects: Get full text
Article -
812
The Relationship between Corporate Social Responsibility (CSR) Reporting and Financing (Bank Loans and Debt Securities)
Published 2024-09-01Subjects: Get full text
Article -
813
Climate change reflects on security of the border villages, case study: Salas Babajani border villages
Published 2020-06-01Subjects: “…security…”
Get full text
Article -
814
Security Enhancement Using Cache Based Reauthentication in WiMAX Based E-Learning System
Published 2015-01-01Get full text
Article -
815
Retracted: Risk Prediction Algorithm of Social Security Fund Operation Based on RBF Neural Network
Published 2024-01-01Get full text
Article -
816
Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
Published 2014-01-01“…Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. …”
Get full text
Article -
817
Information Security Management in Small Public Sector Organizations: Requirements and Design of a Procedural Approach
Published 2023-12-01Subjects: Get full text
Article -
818
A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review
Published 2024-01-01Subjects: Get full text
Article -
819
Library Material Security and Service Delivery in Uganda: A Case Study of Rwenzori International University.
Published 2023Subjects: “…Library Material Security…”
Get full text
Thesis -
820
Perennial crop farming and food security in Kigezi: a case study of Kigezi highland tea
Published 2023Subjects: Get full text
Article