Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4961
Efficient data possession–checking protocol with deduplication in cloud
Published 2017-08-01“…Data integrity verification with deduplication can not only save space of the cloud server but also ensure security of the stored data. In the existing integrity verification scheme, deduplications are implemented by the cloud server. …”
Get full text
Article -
4962
EVOLUȚIA TRAFICULUI DE DROGURI DE MARE RISC DIN ROMÂNIA, ÎN PERIOADA 2016 – 2022
Published 2023-01-01“…High-risk drug trafficking is a growing threat to Romania's national security. Organized crime has been exceedingly resilient to anti-drug policies. …”
Get full text
Article -
4963
Virtual Simulation Design Facing Smart Payment Screen on the Background of Artificial Intelligence
Published 2022-01-01“…The design of the smart payment screen makes the user’s payment more secure, and the payment risk is greatly reduced.…”
Get full text
Article -
4964
Digitization and Preservation of Academic Records: A case Study of Kabale University Registry.
Published 2024“…The study also identified several threats to these records, such as inadequate data security measures, insufficient storage space, cybersecurity threats, poor maintenance of digitization equipment, technological obsolescence, and potential disasters. …”
Get full text
Thesis -
4965
BCSE: Blockchain-Based Trusted Service Evaluation Model over Big Data
Published 2022-03-01“…The registration and authentication records of users’ identity and the reviews for service vendors are all stored in the blockchain network. The security analysis shows that this model can ensure the credibility of users’ reviews for service vendors, and other users can obtain credible reviews of service vendors via the review publicity module. …”
Get full text
Article -
4966
The Role of Artificial Intelligence in Aviation Construction Projects in the United Arab Emirates: Insights from Construction Professionals
Published 2024-12-01“…Despite the UAE’s leadership in AI-driven security advancements, its use in aviation construction is still underdeveloped. …”
Get full text
Article -
4967
XI2S-IDS: An Explainable Intelligent 2-Stage Intrusion Detection System
Published 2025-01-01“…By leveraging SHAP values, XI2S-IDS enhances transparency in decision-making, allowing security analysts to gain clear insights into feature importance and the model’s rationale. …”
Get full text
Article -
4968
STRATEGIC PRIORITIES FOR THE DEVELOPMENT OF THE RUSSIAN ARCTIC AND INSTRUMENTS FOR THEIR RESOURCE SUPPORT
Published 2024-12-01“…The primary objective is to assess the potential resource security required to implement these priorities, utilizing the proposed methodological framework. …”
Article -
4969
A Survey of Post-Quantum Cryptography Migration in Vehicles
Published 2025-01-01“…A promising solution to ensure the continued security attributes of confidentiality, integrity, and availability is the use of Post-Quantum Cryptography (PQC) algorithms. …”
Get full text
Article -
4970
Cooperative Behaviors and Multienergy Coupling Through Distributed Energy Storage in the Peer-to-Peer Market Mechanism
Published 2025-01-01“…A consortium blockchain-based framework ensures secure and private registration. A peer-to-peer network facilitates multienergy trading, enabling efficient energy generation and storage. …”
Get full text
Article -
4971
Flexibility matters: Impact assessment of small and medium enterprises flexibility on the German energy transition
Published 2025-01-01“…By 2045, wind power becomes vital for supply security and is operated as a dispatchable ramping-up technology. …”
Get full text
Article -
4972
Convergence of Blockchain, IoT, and AI for Enhanced Traceability Systems: A Comprehensive Review
Published 2025-01-01“…Key trends include AI-driven analytics, real-time IoT data collection, and the need for secure, tamper-proof data by BC. However, interoperability, scalability, and standardization challenges hinder adoption. …”
Get full text
Article -
4973
AFD and chaotic map‐based integrated approach for ECG compression, steganography and encryption in E‐healthcare paradigm
Published 2021-07-01“…Later, chaotic map‐based steganography and encryption are proposed on the AFD coefficients to secure the confidential information and the signal itself. …”
Get full text
Article -
4974
Experimental demonstration of 8190-km long-haul semiconductor-laser chaos synchronization induced by digital optical communication signal
Published 2025-01-01“…Abstract Common-signal-induced synchronization of semiconductor lasers have promising applications in physical-layer secure transmission with high speed and compatibility with the current fiber communication. …”
Get full text
Article -
4975
Almond cold-pressed oil by-product as ingredient for cookies with potential health benefits: Chemical and sensory evaluation
Published 2019-09-01“…Nowadays, food security is a global concern and a great scientific challenge. …”
Get full text
Article -
4976
A Hybrid Approach for Color Face Recognition Based on Image Quality Using Multiple Color Spaces
Published 2024-12-01“…The proposed method showcases the potential for more reliable and secure recognition systems.…”
Get full text
Article -
4977
An Enhanced LSTM Approach for Detecting IoT-Based DDoS Attacks Using Honeypot Data
Published 2025-02-01“…Abstract One of the widening perils in network security is the Distributed Denial of Service (DDoS) attacks on the Internet of Things (IoT) ecosystem. …”
Get full text
Article -
4978
Anomaly detection of adversarial cyber attacks on electric vehicle charging stations
Published 2025-03-01“…Intruders pose potential risks to the security, reliability, and functionality of the EVCI, by spoofing the data through these charging ports leading to anomalies in the data. …”
Get full text
Article -
4979
Analysis and prediction of urban agglomeration ecological footprint based on improved three-dimensional ecological footprint and shared socioeconomic pathways
Published 2025-01-01“…This study analyzes the spatial–temporal dynamics of ecological security, sustainability, and driving factors in Shaanxi’s Guanzhong urban agglomeration. …”
Get full text
Article -
4980
Explaining the chronopolitical pattern of relations between Iran and Iraq
Published 2025-06-01“…For instance, Iraq is actively engaged in the "FAW Corridor" initiative, whereas Iran seeks to expand economic cooperation and secure a place in the burgeoning alliances of the East. …”
Get full text
Article