Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5001
Advanced Measuring (Instrumentation) Methods for Nuclear Installations: A Review
Published 2012-01-01“…The research of measurement in nuclear installations involves many aspects, such as nuclear reactors, nuclear fuel cycle, safety and security, nuclear accident, after action, analysis, and environmental applications. …”
Get full text
Article -
5002
STRUCTURE AND CONTENT OF PRODUCTION ANALYSIS IN RETAIL CHAINS
Published 2017-09-01“…The issues of analysis in the enterprise security system are touched.…”
Get full text
Article -
5003
Du métro à la rue, de la désobéissance civile à la ‘Primera Línea’ : l’explosion sociale au Chili en octobre 2019
Published 2024-04-01“…The purpose of this article is to study this unprecedented social mobilization since the end of the dictatorship through the relations between the power and the demonstrators thanks to the analysis of the reactions of the government, the collaborations between the different groups, symbols used in the practices of resistance to power and to the security forces of the State and of the collective constituted by the « Front line ». …”
Get full text
Article -
5004
Tropical Foliage Plant Development: Breeding Techniques for Aglaonema and Dieffenbachia
Published 2009-06-01“…Mellich, describes the techniques plant breeders can use for controlling flowering, effecting pollination, and securing seed production. Includes references. Published by the UF Department of Environmental Horticulture, May 2009. …”
Get full text
Article -
5005
Direct anonymous authentication scheme for wireless networks under trusted computing
Published 2010-01-01“…Based on direct anonymous attestation of trusted computing,a wireless anonymous authentication scheme was proposed,the platform of the mobile node was verified by the foreign network agent and the identity of the mobile node user was authenticated by the home network agent and the foreign network agent together.By using of temporary identi-ties and one time secret keys,identity anonymity and domain separation property are achieved.The analysis shows that the scheme is secure,reliable,and with higher performance.…”
Get full text
Article -
5006
IMPLEMENTATION OF PUBLIC-PRIVATE PARTNER-SHIP PROJECTS IN THE RUSSIAN ARCTIC
Published 2018-06-01“…The importance of this task is determined by the fact that the reserves of natural resources located in the Arctic should provide the basis for the energy and economic security of the country. The comparative analysis of ways of realization of infrastructure projects on the basis of the state order and public - private partnership is carried out. …”
Get full text
Article -
5007
THE COMINFORM EMIGRATION IN BULGARIA
Published 2025-02-01“…Research is mostly based on unpublished sources from the State Security Service (UDB) that are kept in the State Archives of Serbia, and also on relevant literature.…”
Get full text
Article -
5008
Evaluation of mimic defense strategy based on M-FlipIt game model
Published 2020-07-01“…To make up for the lack of security performance evaluation of the mimic defense systems in the advanced persistent threat scenarios an improved game model based on the FlipIt game theory model was proposed.The dynamic strategy of mimic defense under different heterogeneity conditions was evaluated,and a case study for the simulation analysis was conducted.The simulation results show that the rotation of indefinite period can make up for the lack of heterogeneity and maintain the higher game payoff of defenders.…”
Get full text
Article -
5009
Novel mobile agent dynamic data integrity protection protocol
Published 2007-01-01“…Integrity characteristics of dynamic data was redefined and classified by attacker capability,and then it was analyzed how to protect truncation attack with collusion.After that,a data protection protocol of free-roaming agent was presented.The protocol used a reverse chained signature to protect the integrity of roaming path,and protected the dy-namic data integrity based on this.Specially,the protocol provided truncation resilience in collusion condition,and its secure property was proved by formal method.…”
Get full text
Article -
5010
RISK FACTORS IDENTIFICATION FOR AGGRESSIVE BEHAVIOR AND PROTECTIVE RESOURCES OF MINORS IN THE MANAGERIAL-SUPERVISORY MODEL OF THE COURT TUTORAGE IN POLAND
Published 2024-12-01“…The classification of minors into risk groups is aimed at improving the efficiency of the work of family probation officers and increasing the sense of security in society.…”
Get full text
Article -
5011
Survey on anonymous authentication mechanisms of VANET
Published 2016-08-01“…VANET has an attractive prospect,it faces serious security issues but at the same time.Access authentica-tion and privacy protection will play important roles to address the issues.A detailed survey on the literature anonymous authentication mechanisms of VANET in terms of their implementation approaches were presented such as anonymous credential and digital signature.The advantages and disadvantages of each mechanism were elabo-rated and the novel research directions were also given with the help of analysis.…”
Get full text
Article -
5012
Trusted routing based on D-S evidence theory in wireless mesh network
Published 2011-01-01“…Combined with Dempster-Shafer(D-S) evidence theory,a trust evaluation model was given,meanwhile,a trusted routing——T-AODV was also proposed which built trusted routings according to the trustworthiness of nodes calculated by the proposed trust evaluation model.Simulation results show that the proposed scheme can detect and isolate malicious nodes efficiently and resist attacks to some extent and improve the reliability,robustness and security of the over all network effectively.…”
Get full text
Article -
5013
Digitalization of national economy
Published 2019-09-01“…The gradual transition to a digital model of development will increase the competitiveness of Russian products on international markets and it will also contribute to the improvement of national security. Analysis of the implementation of information and communication technologies in the national economy shows significant lag behind the leaders. …”
Get full text
Article -
5014
Tropical Foliage Plant Development: Breeding Techniques for Aglaonema and Dieffenbachia
Published 2009-06-01“…Mellich, describes the techniques plant breeders can use for controlling flowering, effecting pollination, and securing seed production. Includes references. Published by the UF Department of Environmental Horticulture, May 2009. …”
Get full text
Article -
5015
Renal Vein Stenting and Gonadal Vein Embolization for Recurrent Varicoceles and Nutcracker Syndrome
Published 2025-01-01Get full text
Article -
5016
The Fog of War: Russia’s War on Ukraine, European Defence Spending and Military Capabilities
Published 2022-06-01Get full text
Article -
5017
-
5018
-
5019
Selling Safely: Cybersecurity Best Practices for Small, Rural Ag Businesses
Published 2022-05-01“…Small businesses, like agricultural and rural businesses, should not think they are immune to this threat: obscurity is not security. This new 6-page publication of the UF/IFAS Department of Agricultural Education and Communication includes some cybersecurity best practices and links to resources for further education. …”
Get full text
Article -
5020
INFORMATION SUPPORT FOR THE TRANSPORT AND LOGISTICS COMPANY
Published 2016-04-01“…The analysis of the major databases characterizing the state of the external and internal environments of transport and logistics companies, which allowed to formulate the problems and trends of development of information security. Examples of public information databases and their impact on the performance of the transport and logistics companies. …”
Get full text
Article