Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
601
Civil substantive and procedural legal means of securing reparations for Ukraine
Published 2023-12-01Get full text
Article -
602
Developing an advanced classifier of threat for security agent behavior models
Published 2019-11-01Get full text
Article -
603
Quantum secure communication network architecture and mobile application solution
Published 2018-09-01Subjects: Get full text
Article -
604
Precision Security: Integrating Video Surveillance with Surrounding Environment Changes
Published 2018-01-01“…Video surveillance plays a vital role in maintaining the social security although, until now, large uncertainty still exists in danger understanding and recognition, which can be partly attributed to intractable environment changes in the backgrounds. …”
Get full text
Article -
605
Research on dynamic migration of virtual machine based on security level
Published 2017-07-01Subjects: Get full text
Article -
606
Analysis and Protection for Information Security Event of Communication Industry User
Published 2013-08-01Subjects: “…information security…”
Get full text
Article -
607
ASSESSMENT OF PSYCHOLOGICAL CHARACTERISTICS OF HUMAN RIGHTS IN THE SECURITY OF ITS WORK
Published 2015-06-01“…The role of motivation for Human Security. The classification of the causes of erroneous actions of man. …”
Get full text
Article -
608
Secure communication optimization for double-IRS assisted SWIPT system
Published 2022-01-01Subjects: Get full text
Article -
609
THE RUSSIAN’S DIGITAL SOVEREIGNTY AS A TECHNICAL BASIS OF INFORMATION SECURITY
Published 2016-12-01Subjects: Get full text
Article -
610
Security mechanisms and data access protocols in innovative wireless networks
Published 2018-09-01Get full text
Article -
611
Research and implementation of data security for mobile terminal based on TEE
Published 2017-03-01Subjects: Get full text
Article -
612
Overview of the data security and privacy-preserving of mobile cloud services
Published 2013-12-01Subjects: Get full text
Article -
613
Architecture and practice of BGP internet routing visibility and security detection
Published 2021-12-01Subjects: Get full text
Article -
614
UC secure one-time signature based broadcast authentication
Published 2010-01-01Subjects: “…network security…”
Get full text
Article -
615
Application of convolutional neural networks in the intelligence security system subsystem
Published 2020-08-01“…The article proposes the structure of an integrated security system for areal facilities. The main subsystems included in its composition are considered. …”
Get full text
Article -
616
Small Arms and Small Countries: Firearms and the International Security Agenda
Published 2016-05-01“…This article examines the emergence of the small arms trade on the international political agenda as a growing security threat. Employing the theoretical framework proposed by the Copenhagen School, this article argues that the issue of small arms gained traction at the international level in the context of the post-Cold War. …”
Get full text
Article -
617
Container Security Device Chain Network for Safe Railway Transportation
Published 2014-11-01“…This paper suggests the use of the container security devices (CSDs), which has been adopted for the marine transportation so far, to enhance the security of railway freight transportation. …”
Get full text
Article -
618
Qualitative analysis of it reliability and security in local government financial reporting
Published 2024-12-01Subjects: Get full text
Article -
619
THE ESSENCE AND COMPONENTS OF THREATS TO THE ECONOMIC SECURITY OF HIGHER EDUCATION INSTITUTIONS
Published 2025-01-01Subjects: Get full text
Article -
620
Embedded software security testing technology for relay protection devices
Published 2018-04-01“…As the first defensive line of power grid security,the right actions of delay protection devices can minimize the influence to the electric power system security caused by system or equipment failures.Based on the research of relay protection device inspection procedures and enterprise standard of electric power industry,the embedded software testing content and technologies of relay protection device were studied,including functional testing,performance testing and fault injection testing.This research contributes to the completeness and correctness of the embedded software testing about relay protection device.…”
Get full text
Article