Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
321
CONTEMPORARY ENERGY SECURITY STUDIES: THEORETICAL ASPECTS
Published 2013-08-01Subjects: “…еnergy security…”
Get full text
Article -
322
-
323
ECONOMIC SECURITY OF THE TECHNICAL UNIVERSITY: SYSTEM OF INDICATORS
Published 2016-12-01Subjects: “…projections of economic security…”
Get full text
Article -
324
Cyber Physical Security of Distributed Energy Resources
Published 2023-12-01Subjects: Get full text
Article -
325
Research on SDN-based cloud security application
Published 2017-05-01Subjects: Get full text
Article -
326
Blockchain-based secure and fair crowdsourcing scheme
Published 2019-07-01“…First, we define the basic requirements of blockchain-based crowdsourcing schemes including fairness, confidentiality, and integrity. And then, using secure hash, commitment, and homomorphic encryption, we propose a blockchain-based secure and fair crowdsourcing scheme, that is, BFC. …”
Get full text
Article -
327
Possibilities of Using Artificial Intelligence in Security Analysis
Published 2024-12-01Subjects: Get full text
Article -
328
Data security challenges and countermeasures in financial technology
Published 2019-08-01Subjects: Get full text
Article -
329
Secure channel estimation model for cognitive radio network physical layer security using two-level shared key authentication
Published 2025-01-01Subjects: Get full text
Article -
330
A Study on Zone-Based Secure Multicast Protocol Technique to Improve Security Performance and Stability in Mobile Ad-Hoc Network
Published 2025-01-01Subjects: Get full text
Article -
331
-
332
Study on the 5GC security situational awareness system
Published 2022-11-01Subjects: Get full text
Article -
333
Security analysis in heterogeneous fault-tolerant control plane
Published 2018-11-01“…With the large-scale application of software-defined networks,the security of software-defined networks becomes more and more important.As an important defense idea,the fault-tolerant control plane based on heterogeneity has attracted more and more researchers' attention in recent years.However,the existing researches ignore the problem of common vulnerability in heterogeneous variants,which greatly reduces the security benefits of the fault-tolerant control architecture for software-defined networks.Addressing this problem,the common vulnerability was taken in heterogeneous variants into considerations.First,the tolerance capability of the fault-tolerant control plane was quantified.Then a control plane deployment method was constructed which was able to maximize the tolerance capability.The simulations show that the proposed method can effectively reduce the failure probability of the control plane.When the attackers attack the control plane constructed based on the proposed method,they pay more attack cost to compromise the control plane.…”
Get full text
Article -
334
Parents' Postnatal Sense of Security: A Concept Analysis
Published 2024-12-01Subjects: Get full text
Article -
335
Community Food Security and Florida Cooperative Extension Service
Published 2007-07-01“…Swisher, defines community food security and identifies its importance for extension agents in Florida. …”
Get full text
Article -
336
RETRACTED: Approaches to quantifying the conditions of national financial security
Published 2024-01-01Get full text
Article -
337
Lightweight and secure search scheme for medical data sharing
Published 2024-11-01Subjects: Get full text
Article -
338
Method Framework for Developing Enterprise Architecture Security Principles
Published 2019-10-01Subjects: Get full text
Article -
339
TCCL:secure and efficient development of desktop cloud structure
Published 2017-10-01Subjects: Get full text
Article -
340
Political and security reflections of Albanian terrorism on the Republic of Serbia
Published 2024-01-01Subjects: Get full text
Article