Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
381
Formation of the System of Threats to Energy Security of the Republic of Belarus
Published 2019-08-01Subjects: “…energy security…”
Get full text
Article -
382
Multilevel secure access control policy for distributed systems
Published 2017-08-01Subjects: Get full text
Article -
383
Securing Bird Feeders from Florida Black Bears
Published 2017-05-01“…This 3-page fact sheet explains how to secure bird seed from bears so that they don’t become reliant on human food sources, a condition that puts them at greater risk of being killed from vehicle collisions, illegal shooting, or euthanasia. …”
Get full text
Article -
384
COOPERATION BETWEEN RUSSIA AND BAHRAIN IN THE FIELD OF REGIONAL SECURITY
Published 2017-11-01Subjects: Get full text
Article -
385
Survey of artificial intelligence data security and privacy protection
Published 2021-02-01Subjects: Get full text
Article -
386
POVERTY AND NATIONAL SECURITY: AN OVERVIEW OF NIGERIA’S FOURTH REPUBLIC
Published 2024-07-01Subjects: “…National Security…”
Get full text
Article -
387
John Lewis Gaddis. Surprise, Security and the American Experience.
Published 2006-04-01Get full text
Article -
388
HIPSCS:secure IP communication system based on HIP
Published 2012-11-01Subjects: Get full text
Article -
389
Provable secure ownership transfer protocol for RFID tag
Published 2015-08-01“…With the ownership transfer of an object,the ownership of the RFID tag attached to it also needs to be transferred.Security and privacy are the key issues while researchers studying the process of RFID tag ownership transfer.In the UC(universally composable)framework,an ideal functionality of RFID tag ownership transfer is formally defined.Then,a novel lightweight ownership transfer protocol for RFID tag is proposed.Subsequently,it is proved that proposed protocol realizes the previously defined ideal functionality and satisfies the required security properties such as mutual authentication,tag anonymity,resistance to de-synchronization attacks,forward privacy protection and backward privacy protection.Compared with the existing ownership transfer protocols for RFID tags,the computational complexity and the storage requirements of proposed protocol are all lower.Meanwhile,the number of interaction among the entities is small.Therefore,the proposed protocol can efficiently implement ownership transfer for low-cost tags.…”
Get full text
Article -
390
Secure P2P Data Storage and Maintenance
Published 2010-01-01“…P2P data storage requires strong reliability and security assurances. Existing data storage solutions have been designed for centralized as well as distributed settings; yet they do not address the security and cooperation issues raised by self-organization. …”
Get full text
Article -
391
Research on Space-Ground Network Security Guarantee Technology
Published 2020-09-01Subjects: “…space-ground network security guarantee…”
Get full text
Article -
392
A survey on DNS attack detection and security protection
Published 2022-09-01Subjects: Get full text
Article -
393
Optimization of cyber security through the implementation of AI technologies
Published 2025-02-01Subjects: Get full text
Article -
394
System of subjects ensuring national security and defence of Ukraine
Published 2020-06-01Subjects: “…system of subject for ensuring the national security and defense…”
Get full text
Article -
395
Information security vulnerability scoring model for intelligent vehicles
Published 2022-02-01“…More and more electronic devices are integrated into the modern vehicles with the development of intelligent vehicles.There are various design flaws and vulnerabilities hidden in a large number of hardware, firmware and software.Therefore, the vulnerabilities of intelligent vehicles have become the most important factor affecting the vehicle safety.The safety of vehicles is seriously affected by the disclosure of a large number of vulnerabilities, and the wide application of smart cars is also restricted.Vulnerability management is an effective method to reduce the risk of vulnerabilities and improve vehicle security.And vulnerability scoring is one the important step in vulnerability management procedure.However, current method have no capability assessing automotive vulnerabilities reasonably.In order to handle this problem, a vulnerability scoring model for intelligent vehicles was proposed, which was based on CVSS.The attack vector and attack complexity were optimized, and property security, privacy security, functional safety and life safety were added to characterize the possible impact of the vulnerabilities according to the characteristics of intelligent vehicles.With the machine learning method, the parameters in CVSS scoring formula were optimized to describe the characteristics of intelligent vehicle vulnerabilities and adapt to the adjusted and new added weights.It is found in case study and statistics that the diversity and distribution of the model are better than CVSS, which means the model can better score different vulnerabilities.And then AHP is used to evaluate the vulnerability of the whole vehicle based on the vulnerability score of the model, a score is given representing the risk level of whole vehicle.The proposed model can be used to evaluate the severity of information security vulnerabilities in intelligent vehicles and assess the security risks of the entire vehicle or part of the system reasonably, which can provide an evidence for fixing the vulnerabilities or reinforcing the entire vehicle.…”
Get full text
Article -
396
Ensuring the economic security of the country in the new geopolitical realities
Published 2023-09-01Subjects: Get full text
Article -
397
Efficient and Secure Traffic Scheduling Based on Private Sketch
Published 2025-01-01“…In this paper, we propose ESTS, an efficient and secure traffic scheduling based on private sketch, capable of identifying tail contributors to adjust routing and prevent congestion. …”
Get full text
Article -
398
Secure key-sharing algorithm based on smart grid
Published 2021-08-01Subjects: “…smart grid security,…”
Get full text
Article -
399
Information Security and Privacy Management in Intelligent Transportation Systems
Published 2024-04-01Subjects: “…information security management…”
Get full text
Article -
400
Community Food Security and Florida Cooperative Extension Service
Published 2007-07-01“…Swisher, defines community food security and identifies its importance for extension agents in Florida. …”
Get full text
Article