Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3821
Soil warming increases the active antibiotic resistome in the gut of invasive giant African snails
Published 2025-02-01Get full text
Article -
3822
UNREST AND UNFILLED STOMACHS: UNRAVELLING THE LINKAGE BETWEEN ARMED CONFLICT AND FOOD INSECURITY IN NORTH CENTRAL REGION OF NIGERIA
Published 2024-07-01“…Due to resource competition, political and ethnic tensions, historical grievances, and religious extremism, the region has seen protracted armed conflicts. Food security has declined as an outcome of disruptions in agriculture, infrastructure, and market systems. …”
Get full text
Article -
3823
Robust Schnorr-based subgroup multi-signature scheme
Published 2024-08-01“…The unpredictability of the subgroups effectively avoided the occurrence of Byzantine traitors, thus enhancing security and solving the problems of low reliability, security, and high computational complexity in consensus mechanisms. …”
Get full text
Article -
3824
Obesity Differentially Affects Phenotypes of Polycystic Ovary Syndrome
Published 2012-01-01Get full text
Article -
3825
Indoor localization based on subarea division with fuzzy C-means
Published 2016-08-01Get full text
Article -
3826
-
3827
Variational Estimation of Optimal Signal States for Quantum Channels
Published 2024-01-01Get full text
Article -
3828
Institutionalization of the UN Police Peacekeeping
Published 2019-03-01“…Article studies the strategic frame, organizational and operational aspects of UN peacekeeping missions police components activities to ensure sustaining peace.It is noted that at present the UN Police actively participates in UN peace operations acting as an integrated solution of issues of peace and security. Consideration is also given to the growing importance of the UN Police to international peace and security and the increased attention given to policing by the Security Council and the Secretary General.The UN police now engage in United Nations peace operations across the entire peace and security spectrum, from conflict prevention to peacekeeping and peacebuilding. …”
Get full text
Article -
3829
Bearing Capacities of Different-Diameter Concrete-Filled Steel Tubes under Axial Compression
Published 2016-01-01Get full text
Article -
3830
Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab World
Published 2025-01-01“…It emphasizes the critical role of social networks in contemporary cyber-attack landscapes, offering practical implications for cybersecurity practitioners, law enforcement agencies, and policymakers committed to securing the digital environment in Arab nations.…”
Get full text
Article -
3831
Explaining the Integrated Approach to Border Management and Control: A Case Study of Iranian Land Borders
Published 2023-12-01“…Given the different approaches to border control and management, it can be seen that this issue is still viewed as a security issue in developing countries, including Iran, and most of the approaches related to this are from a purely security perspective. …”
Get full text
Article -
3832
THE POLITICS OF INSECURITY REPORTAGE IN NORTHERN NIGERIA
Published 2024-05-01“… Nigeria is faced with different challenges that nearly comatose the security architecture of the country. In the geopolitical North, it started as mere conflict over access to land largely involving herders and farmers. …”
Get full text
Article -
3833
Experimental Study on the Performance and Microstructure of Cementitious Materials Made with Dune Sand
Published 2016-01-01Get full text
Article -
3834
A Stackelberg-Game-Based Power Control Algorithm for Wireless Mesh Networks
Published 2013-01-01Get full text
Article -
3835
Research on the Defense of Advanced Persistent Threats in Enterprise Network
Published 2013-12-01“…The features of APT and the reason why traditional security defense architecture was failed were discussed. …”
Get full text
Article -
3836
Hybrid dung beetle optimization based dimensionality reduction with deep learning based cybersecurity solution on IoT environment
Published 2025-01-01“…Securing IoT devices involves implementing security measures and best practices to secure them from potential vulnerabilities and threats. …”
Get full text
Article -
3837
-
3838
Udlicitering af politiets opgaver i Danmark og Sverige
Published 2020-04-01“…Abstract The growth in the private security industry alongside a persistent separation of policing from the state is a well-documented Western phenomenon. …”
Get full text
Article -
3839
Multi-server identity authentication scheme based on biometric and chaotic maps
Published 2017-02-01“…Password-based user remote authentication system has been widely used in recent years,the study found that a single password system is so vulnerable to dictionary analysis and brute force attack as well as other attacks that the security is not high.Biometric and password combination authentication method gradually added to the remote authentication system in order to improve the security level of authentication system.However,the existing authentication systems work in a single server environment,if extended to a multi-server environment,biometric templates and passwords will encounter single point breakthrough and cross-crack problem.In order to overcome the above problems,a multi-server key authentication scheme based on biometric and chaotic map was proposed.The scheme was based on smart cards,passwords and biometrics,which could significantly improve the security and the ability of anti-password guessing of multi-server authentication systems.…”
Get full text
Article -
3840
High capacity reversible hiding in encrypted domain based on cipher-feedback secret sharing
Published 2023-09-01“…To improve the security, robustness and embedding rate of reversible hiding in encrypted domain in the distributed environment, a multiple embedding algorithm based on cipher-feedback secret sharing was proposed.Firstly, the additional data were embedded into the polynomial coefficients redundancy generated in the process of secret image sharing.Secondly, the extra secrets were embedded by using the additive homomorphism of secret sharing.Experimental results demonstrate that a better security and robustness has been obtained by improving the diffusion characteristic of secret sharing using the feedback mechanism.In the (3,4) and (3,5) threshold, the embedding rates can reach 6.00 bit per pixel and 4.80 bit per pixel respectively.The proposed algorithm can not only maintain the strong security and separability, but also obtain a better embedding capacity.Meanwhile, the embedding rate of the scheme is not affected by the carrier image and is only related to the selection of algorithm parameters.…”
Get full text
Article