Showing 161 - 180 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 161

    Community Food Security and Florida Cooperative Extension Service by Alison E. Lutz, Nick T. Place, Mickie E. Swisher

    Published 2007-07-01
    “…Swisher, defines community food security and identifies its importance for extension agents in Florida. …”
    Get full text
    Article
  2. 162
  3. 163

    «Human Security»: Concept, Political Discourse, and Ways of Implimintation by A. V. Khudaykulova

    Published 2010-12-01
    “…На фоне существования множес- тва трактовок human security наиболее адекватно её смысл передаёт термин безопасность личности. …”
    Get full text
    Article
  4. 164

    Secure Localization in Wireless Sensor Networks with Mobile Beacons by Ting Zhang, Jingsha He, Hong Yu

    Published 2012-10-01
    “…We present a scheme, called SLMB, for secure sensor localization in WSNs in which we propose to use a mobile beacon node with the goal of reducing the overall energy consumption in sensor nodes during sensor localization. …”
    Get full text
    Article
  5. 165

    THE PERSPECTIVES OF INTERNATIONAL REGULATION OF PRIVATE MILITARY AND SECURITY COMPANIES’ by M. A. Nebolsina, A. I. Nikitin

    Published 2016-04-01
    Subjects: “…private military and security companies…”
    Get full text
    Article
  6. 166

    Improving the information security sustainability of the economy financial sector by V. V. Kachurin, R. G. Akhmadeev

    Published 2023-06-01
    “…The study analyzes the main activities of Russia Bank, aimed at ensuring the sustainability of information security in the financial sector of the economy, as well as ongoing activities aimed at limiting the spread of cybercrime based on an automated incident handling system. …”
    Get full text
    Article
  7. 167

    Systematic literature review on Internet-of-Vehicles communication security by Manar Abu Talib, Sohail Abbas, Qassim Nasir, Mohamad Fouzi Mowakeh

    Published 2018-12-01
    “…As a result, there is an urgent need to study the possible security threats and different solutions that can ensure the safety of drivers and also the security of industry. …”
    Get full text
    Article
  8. 168
  9. 169
  10. 170
  11. 171
  12. 172
  13. 173
  14. 174

    Secure and Privacy Enhanced Gait Authentication on Smart Phone by Thang Hoang, Deokjai Choi

    Published 2014-01-01
    “…In this paper, we propose a novel gait based authentication using biometric cryptosystem to enhance the system security and user privacy on the smart phone. Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. …”
    Get full text
    Article
  15. 175
  16. 176

    An Efficient Data Analysis Framework for Online Security Processing by Jun Li, Yanzhao Liu

    Published 2021-01-01
    “…Industrial cloud security and internet of things security represent the most important research directions of cyberspace security. …”
    Get full text
    Article
  17. 177
  18. 178

    Challenges of Gender Policy Implementation in the Security and Defense Sector by O. M. Tsukan, M. Yu. Burdin

    Published 2020-09-01
    “…The authors of the article have studied the problems of ensuring the principles of gender equality in the free trade sector of the security and defense sector. Aspects of gender equality have a special role in ensuring the educational process, managing the free economic zone and overcoming stereotyping of society, especially in the security and defense sector. …”
    Get full text
    Article
  19. 179

    Information Security Risk Management Model for Big Data by Min Yang

    Published 2022-01-01
    “…The essence of information security management is risk management, which is closely related to each other. …”
    Get full text
    Article
  20. 180

    A Study on the Security Algorithm for Contexts in Smart Cities by Hoon Ko, Kitae Bae, Sang Heon Kim, Kyung Jin An

    Published 2014-06-01
    “…However, the provided services are to be secured and well protected. Each customised service usually keeps tailored security policy and algorithm. …”
    Get full text
    Article