Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
841
Recent advancements in durable and self-healing oil well cement: A pathway to secure carbon sequestration
Published 2025-02-01“…The integrity of the cement sheath in storage wells is essential to secure the subsurface CO2 storage, however, acidic CO2 can erode the cement sheath over time, leading to chemical and mechanical damages of cement, risking CO2 leakage. …”
Get full text
Article -
842
Efficient and secure attribute-based heterogeneous online/offline signcryption for body sensor networks based on blockchain
Published 2019-09-01“…Moreover, hybrid blockchain provides advantages of interoperability, transparency traceability, and universal access. The formal security analysis of the proposed scheme is proved in the standard model, and informal security assures that our scheme provides resistance against possible attacks. …”
Get full text
Article -
843
SYNERGY BETWEEN THE YOUTH AND A SECURED NATION: AN ATTEMPT TO DEVELOP NIGERIA THROUGH POLITICS AND ELECTORAL REMINISCENCE
Published 2024-05-01“…The study thereby recommends that; godliness, provision of employment opportunities by the government, secured borders, good parental care etc will improve on the security state of the nation. …”
Get full text
Article -
844
2003 Handbook of Employment Regulations Affecting Florida Farm Employers and Workers: Social Security and Medicare [Federal]
Published 2003-07-01“… The purpose of Social Security and Medicare is to provide social benefits to qualified workers who retire, become disabled, and/or require medical assistance. …”
Get full text
Article -
845
2003 Handbook of Employment Regulations Affecting Florida Farm Employers and Workers: Social Security and Medicare [Federal]
Published 2003-07-01“… The purpose of Social Security and Medicare is to provide social benefits to qualified workers who retire, become disabled, and/or require medical assistance. …”
Get full text
Article -
846
Research on power plant security issues monitoring and fault detection using attention based LSTM model
Published 2025-01-01Subjects: Get full text
Article -
847
Prerequisites for the legal mechanisms development to combat disinformation in social media in the context of national security: problem statement
Published 2021-12-01Subjects: Get full text
Article -
848
Securing safer care staff: a model for the assessment, selection and training of staff to work in residential care
Published 2006-03-01Subjects:Article -
849
Designing the Interventions to Mitigate the Barriers of Coordination in Handling Food Security: Insight from Central Java Province
Published 2022-01-01“…This study aims to identify the underlying barriers that may prevent public policy coordination among stakeholders in dealing with food security in Central Java Province and suggest recommendations to enhance the coordination. …”
Get full text
Article -
850
Marilena Koppa. The Evolution of the Common Security and Defence Policy: Critical Junctures and the Quest for EU Strategic Autonomy
Published 2024-04-01“…The Evolution of the Common Security and Defence Policy: Critical Junctures and the Quest for EU Strategic Autonomy. …”
Get full text
Article -
851
Study of tactics and personal security measures of the dialogue police during the protection of public order at mass events
Published 2022-12-01Subjects: Get full text
Article -
852
Exploring Text Mining and Analytics for Applications in Public Security: an in-depth dive into a systematic literature review
Published 2023-07-01Subjects: Get full text
Article -
853
Singapore Government Securitization Measures against Transboundary Haze Pollution as a Non-Traditional Security Threat
Published 2025-01-01“…It can be inferred that the government possesses complete authority to secure the smog issue. The community's response is critical in determining the success of haze securitization. …”
Get full text
Article -
854
Quantum secure patient login credential system using blockchain for electronic health record sharing framework
Published 2025-02-01“…This study proposes a secure Patient Login Credential System (PLCS) for EHRS. …”
Get full text
Article -
855
Using the five-factor questionnaire to study the personality of a specialist-cynologist of the security agencies of the Russian Federation
Published 2024-11-01Subjects: Get full text
Article -
856
Directions of the territory’s investment security mechanisms improvement in the context of digital transformation: Krasnodar Krai case study
Published 2023-03-01Subjects: “…investment security…”
Get full text
Article -
857
Determinants of food security indicators in Bahir Dar City, Ethiopia: a focus on female-headed households
Published 2025-01-01“…This study aims to identify the determinants of food security among female-headed households across three sub-cities and six kebele administrations in Bahir Dar. …”
Get full text
Article -
858
-
859
Towards Secure Internet of Things: A Coercion-Resistant Attribute-Based Encryption Scheme with Policy Revocation
Published 2025-01-01“…Moreover, the scheme employs attribute-based encryption to secure IoT data, enabling fine-grained access control and dynamic user access management, providing a secure and flexible solution for vast IoT data. …”
Get full text
Article -
860
Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks
Published 2021-01-01“…First, we analyze the security threats faced by industrial controllable load, civil controllable load, and the gains and losses of attacks on the distribution networks. …”
Get full text
Article