Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
181
Problems of economic security management of the enterprises of the aviation industry
Published 2018-12-01Subjects: Get full text
Article -
182
Defense and Security Mechanisms in the Internet of Things: A Review
Published 2025-01-01Subjects: Get full text
Article -
183
Secure and Privacy Enhanced Gait Authentication on Smart Phone
Published 2014-01-01“…In this paper, we propose a novel gait based authentication using biometric cryptosystem to enhance the system security and user privacy on the smart phone. Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. …”
Get full text
Article -
184
WORLD EXPERIENCE IN ADMINISTRATIVE AND LEGAL SUPPORT OF FOOD SECURITY
Published 2024-12-01Subjects: “…food security…”
Get full text
Article -
185
An Efficient Data Analysis Framework for Online Security Processing
Published 2021-01-01“…Industrial cloud security and internet of things security represent the most important research directions of cyberspace security. …”
Get full text
Article -
186
Improving the level of food security of the region: cluster approach
Published 2021-10-01Subjects: “…economic security…”
Get full text
Article -
187
Challenges of Gender Policy Implementation in the Security and Defense Sector
Published 2020-09-01“…The authors of the article have studied the problems of ensuring the principles of gender equality in the free trade sector of the security and defense sector. Aspects of gender equality have a special role in ensuring the educational process, managing the free economic zone and overcoming stereotyping of society, especially in the security and defense sector. …”
Get full text
Article -
188
Information Security Risk Management Model for Big Data
Published 2022-01-01“…The essence of information security management is risk management, which is closely related to each other. …”
Get full text
Article -
189
A Study on the Security Algorithm for Contexts in Smart Cities
Published 2014-06-01“…However, the provided services are to be secured and well protected. Each customised service usually keeps tailored security policy and algorithm. …”
Get full text
Article -
190
Methodology of Creation and Structure of the Corporate Information Security Unit
Published 2022-11-01Subjects: Get full text
Article -
191
Formation of the System of Threats to Energy Security of the Republic of Belarus
Published 2019-08-01Subjects: “…energy security…”
Get full text
Article -
192
Securing Bird Feeders from Florida Black Bears
Published 2017-05-01“…This 3-page fact sheet explains how to secure bird seed from bears so that they don’t become reliant on human food sources, a condition that puts them at greater risk of being killed from vehicle collisions, illegal shooting, or euthanasia. …”
Get full text
Article -
193
COOPERATION BETWEEN RUSSIA AND BAHRAIN IN THE FIELD OF REGIONAL SECURITY
Published 2017-11-01Subjects: Get full text
Article -
194
POVERTY AND NATIONAL SECURITY: AN OVERVIEW OF NIGERIA’S FOURTH REPUBLIC
Published 2024-07-01Subjects: “…National Security…”
Get full text
Article -
195
John Lewis Gaddis. Surprise, Security and the American Experience.
Published 2006-04-01Get full text
Article -
196
Secure P2P Data Storage and Maintenance
Published 2010-01-01“…P2P data storage requires strong reliability and security assurances. Existing data storage solutions have been designed for centralized as well as distributed settings; yet they do not address the security and cooperation issues raised by self-organization. …”
Get full text
Article -
197
Optimization of cyber security through the implementation of AI technologies
Published 2025-02-01Subjects: Get full text
Article -
198
System of subjects ensuring national security and defence of Ukraine
Published 2020-06-01Subjects: “…system of subject for ensuring the national security and defense…”
Get full text
Article -
199
Ensuring the economic security of the country in the new geopolitical realities
Published 2023-09-01Subjects: Get full text
Article -
200
Efficient and Secure Traffic Scheduling Based on Private Sketch
Published 2025-01-01“…In this paper, we propose ESTS, an efficient and secure traffic scheduling based on private sketch, capable of identifying tail contributors to adjust routing and prevent congestion. …”
Get full text
Article