Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4781
Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method
Published 2015-01-01“…Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. …”
Get full text
Article -
4782
Explaining The Territoriality Of Fundamentalist Organizations in Fragile States(Case Study: ISIS in Libya)
Published 2018-03-01“…Fundamentalism is one of the security issues of today's world, and the Territorialize and , Territoriality of fundamentalist terrorist groups has attracted a large part of the world's security literature. …”
Get full text
Article -
4783
Performance Improvement Based Authentication Protocol for Intervessel Traffic Service Data Exchange Format Protocol Based on U-Navigation System in WoT Environment
Published 2014-01-01“…And the vessel traffic information requires high security since it is highly protected by the countries. …”
Get full text
Article -
4784
ORGANIZATIONAL AND LEGAL ASPECTS OF THE REGULATION OF LABOR RELATIONS OF AN EDUCATIONAL ORGANIZATION AND AN ADVISER TO THE DIRECTOR OF EDUCATION
Published 2024-07-01“…Law enforcement practice demonstrates problems in the field of concluding an employment contract and its essential conditions, securing a list of labor functions, securing a position in the staffing table, calculating wages, etc. …”
Get full text
Article -
4785
South Africa after 30 years of democracy: Land claims and transitional justice in the spotlight
Published 2024-12-01“…Transitional justice is a universal strategy employed worldwide to secure peace and avoid warfare when an authoritarian regime is succeeded by democratic rule. …”
Get full text
Article -
4786
Evolutionary modeling and robustness analysis of multi-domain cooperative communication network under the environment of Internet of things
Published 2022-11-01“…Through real-time monitoring and updating of the performance and security indicators of the multi-domain cooperative communication networks, it provides a strong guarantee for the node deployment and security management of the Internet of things cooperative communication system.…”
Get full text
Article -
4787
Quantum Private Comparison Protocol with Cluster States
Published 2025-01-01“…In this paper, we introduce a quantum private comparison (QPC) protocol designed for two players to securely and privately assess the equality of their private information. …”
Get full text
Article -
4788
A one health approach to plant health
Published 2022-09-01“…In this opinion piece, based on a webinar of the same name, we argue that a One Health perspective can help optimize net benefits from plant protection, realizing food security and nutrition gains while minimizing unintentional negative impacts of plant health practices on people, animals and ecosystems. …”
Get full text
Article -
4789
Tannin alleviated reproductive dysfunction in pregnant ewes infected with Haemonchus contortus
Published 2025-02-01Get full text
Article -
4790
Dynamic Simulation Analysis of the Start-up Process of Take-up Device of the Belt Conveyor
Published 2017-01-01“…The dynamic characteristic of the belt conveyor in the start-up operating condition is analyzed,the dynamic simulation analysis of the take-up device of the belt conveyor started by the styles of the combined cycloid,Nordell and equal acceleration and the optimization simulation analysis of the pulling force are carried out,the oversize and the undersize of local stress in the belt is prevented,so that the security and reliability of the belt conveyor can be ensured.…”
Get full text
Article -
4791
Making Simple Repairs: Holes in the Wall
Published 2019-05-01“… Landlords will deduct money from your security deposit if they have to fill in holes when you leave. …”
Get full text
Article -
4792
Research on naming and addressing technology of the Internet of things
Published 2018-09-01“…With the rapid development of Internet of things,traditional naming and addressing schemes such as IP and URI are facing many challenges,including mobility,security and scalability,etc.In such context,the research progress of naming and addressing technology based on traditional network architecture and future network architecture was described.Then the development trend and core problems in this field were discussed.It was expected to be helpful for the domestic research in the related field.…”
Get full text
Article -
4793
Asymmetric Information and Quantization in Financial Economics
Published 2012-01-01“…We illustrate the utility of this approach by deriving arbitrage-free derivative-security dynamics.…”
Get full text
Article -
4794
Profiles of the Hard to Employ and the Implications for Job Success
Published 2003-03-01“… This report, Profiles of the Hard to Employ and the Implications for Job Success, is part of the UF/IFAS Welfare-to-Work Initiative (Grant #A6218) funded by the Florida Agency for Workforce Innovation (formerly Florida Department of Labor and Employment Security). The Principal Investigator is Elizabeth B. …”
Get full text
Article -
4795
Countermeasures to promote the systematic construction of the military IoT
Published 2018-06-01“…The military Internet of things (MIoT) is an important part of the military network information system.Based on this,the significance of MIoT systematic construction were described firstly.Then the main contents of construction of MIoT was provided,such as sensing network system,public architecture service system,standard specification system,security system and demonstration project.Finally,the countermeasures of promoting the systematic construction of MIoT were discussed.…”
Get full text
Article -
4796
Employer Sponsored Retirement Savings Plans
Published 2012-05-01“…A financially secure retirement is a goal for many workers, and the ability to achieve that plan can be helped by employer-sponsored retirement plans. …”
Get full text
Article -
4797
Employer Sponsored Retirement Savings Plans
Published 2012-05-01“…A financially secure retirement is a goal for many workers, and the ability to achieve that plan can be helped by employer-sponsored retirement plans. …”
Get full text
Article -
4798
Making Simple Repairs: Holes in the Wall
Published 2019-05-01“… Landlords will deduct money from your security deposit if they have to fill in holes when you leave. …”
Get full text
Article -
4799
Profiles of the Hard to Employ and the Implications for Job Success
Published 2003-03-01“… This report, Profiles of the Hard to Employ and the Implications for Job Success, is part of the UF/IFAS Welfare-to-Work Initiative (Grant #A6218) funded by the Florida Agency for Workforce Innovation (formerly Florida Department of Labor and Employment Security). The Principal Investigator is Elizabeth B. …”
Get full text
Article -
4800
Adversarial attack and defense on graph neural networks: a survey
Published 2021-06-01“…For the numerous existing adversarial attack and defense methods on GNN, the main adversarial attack and defense algorithms of GNN were reviewed comprehensively, as well as robustness analysis techniques.Besides, the commonly used benchmark datasets and evaluation metrics in the security research of GNN were introduced.In conclusion, some insights on the future research direction of adversarial attacks and the trend of development were put forward.…”
Get full text
Article