-
1
-
2
Financial and Investment Model for Social Security and Sustainable Economic Growth
Published 2024-11-01Subjects: “…social security models…”
Get full text
Article -
3
A Systematic Literature Review on Tackling Cyber Threats for Cyber Logistic Chain and Conceptual Frameworks for Robust Detection Mechanisms
Published 2025-01-01Subjects: Get full text
Article -
4
Security Implications of the Anthropology of Āyatullāh Jawādī Amulī
Published 2011-09-01Subjects: “…security models…”
Get full text
Article -
5
Threat Vector–Hierarchical Attack Representation Model-Based Threat Modeling and Security Assessment for Satellite Networks
Published 2025-03-01Subjects: Get full text
Article -
6
Security model without managers for blockchain trading system
Published 2020-12-01Subjects: Get full text
Article -
7
Research towards IoT-oriented universal control system security model
Published 2012-11-01Subjects: Get full text
Article -
8
Biomimetic security model based on immune system control mechanism
Published 2025-04-01Subjects: Get full text
Article -
9
Automated configuration,simulation and verification platform for event-driven home automation IoT system
Published 2019-09-01Subjects: “…internet of things;IFTTT framework;system security;model checking…”
Get full text
Article -
10
Correcting the security definition of the Bellare-Rogaway 3PKD model
Published 2007-01-01Subjects: “…security model…”
Get full text
Article -
11
Wireless physical-layer security model based on perturbation theory and sensitivity analysis
Published 2013-06-01Subjects: “…security model;wireless communication;low probability of interception;sensitivity analysis…”
Get full text
Article -
12
CONCEPTUAL FRAMEWORK OF ANALYSIS OF INFORMATION SECURITY MODELS OF CLOUD SYSTEMS OF THE CLASS «INFRASTRUCTURE AS A SERVICE»
Published 2019-10-01Subjects: Get full text
Article -
13
A Novel Cryptography-Based Architecture for Secure Data Asset Sharing and Circulation Systems
Published 2025-06-01Subjects: Get full text
Article -
14
Data security challenges and countermeasures in financial technology
Published 2019-08-01Subjects: Get full text
Article -
15
Security Substrate Based Security Management and Control Mecbanism of Reconfigurable Network
Published 2014-07-01Subjects: Get full text
Article -
16
Permutation-Based Hash Chains with Application to Password Hashing
Published 2024-12-01Subjects: Get full text
Article -
17
Cryptanalysis of Ateniese–Steiner–Tsudik-Authenticated Group Key Management Protocol
Published 2024-09-01Subjects: Get full text
Article -
18
Graph database based security protection mechanism of 5G network data flow
Published 2021-04-01Subjects: Get full text
Article -
19
Assessment of Landscape Risks and Ecological Security Patterns in the Tarim Basin, Xinjiang, China
Published 2025-06-01Subjects: “…ecological security model…”
Get full text
Article -
20
A Comprehensive Analysis of Security Challenges in ZigBee 3.0 Networks
Published 2025-07-01Subjects: Get full text
Article