Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
721
Survey on rail transit mobile edge computing network security
Published 2023-04-01“…The introduction of mobile edge computing (MEC) technology in rail transit which has the characteristics of complex environment, high densities of passengers, and high-speed mobility can meet the low latency, mobility, and massive connection requirements of rail transit.However, MEC not only improves the performance of rail transit communication network but also brings security challenges.Firstly, an overview of rail transit communication network and MEC was given.Then the value of introducing MEC into rail transit and the architecture of rail transit edge computing network were discussed.After that, the security threats faced by rail transit edge computing network was analyzed and protection scheme was proposed.Finally, some open questions were proposed, which was expected to provide ideas for future research.…”
Get full text
Article -
722
Exploiting Blockchain Technology for Enhancing Digital Twins’ Security and Transparency
Published 2025-01-01“…In particular, we demonstrate how blockchain can improve critical aspects of the security and transparency of digital twins by analyzing a real-world scenario and evaluating produced experimental data. …”
Get full text
Article -
723
Assessment of Economic Management of Land Resources to Enhance Food Security
Published 2025-01-01“… To achieve the goals of balanced development of the agricultural sector to ensure food security, there is a need to improve management processes in the sphere of agricultural land use. …”
Get full text
Article -
724
The Role of Security Perception and Usage Impact of Mobile Accounting Applications
Published 2025-01-01Subjects: “…technology acceptance model; mobile accounting application; security perception.…”
Get full text
Article -
725
Survey on data security and privacy-preserving for the research of edge computing
Published 2018-03-01Subjects: Get full text
Article -
726
Security Study of Software-Defined Enterprise Data Center Network
Published 2014-11-01Subjects: Get full text
Article -
727
Physical layer security of relay selection NOMA wireless systems
Published 2024-03-01Subjects: Get full text
Article -
728
Secure and collaborative spectrum sensing scheme based on audit game
Published 2023-12-01Subjects: Get full text
Article -
729
Optimal Management of Computer Network Security in the Era of Big Data
Published 2022-01-01“…The development of big data and its related technology supports and promotes a new round of technological innovation, making a new generation of information security technology reform and innovation, bringing opportunities and challenges to optimize, and consolidating national information security. …”
Get full text
Article -
730
LEACH protocol based security mechanism for Sybil attack detection
Published 2011-01-01Subjects: Get full text
Article -
731
GUC-secure protocol for private relational join operator computing
Published 2014-11-01Subjects: “…secure multiparty computation…”
Get full text
Article -
732
5G MEC system security capability deployment scheme
Published 2022-11-01Subjects: Get full text
Article -
733
LSKE: Lightweight Secure Key Exchange Scheme in Fog Federation
Published 2021-01-01“…Yashar et al. recently proposed a secure key exchange scheme for the fog federation. …”
Get full text
Article -
734
Endogenous security common problems and solutions of the mobile communication networks
Published 2022-09-01Subjects: Get full text
Article -
735
SDN security prediction method based on bayesian attack graph
Published 2021-11-01Subjects: “…SDN security prediction…”
Get full text
Article -
736
Towards edge-collaborative,lightweight and secure region proposal network
Published 2020-10-01Subjects: Get full text
Article -
737
Ontological security dynamics in the EU accession process of North Macedonia
Published 2024-01-01Subjects: “…ontological security…”
Get full text
Article -
738
Security Mechanism for Dual Stack Network Accessing of Home Gateway
Published 2014-12-01“…Secondly, three methods were given to solve the security problems. At last, a realization and experiment result was given.…”
Get full text
Article -
739
Legal regulation of relations connected to service in the Security Service of Ukraine
Published 2023-12-01Subjects: Get full text
Article -
740
Smart Home Security: An Efficient Multi-Factor Authentication Protocol
Published 2024-01-01Subjects: “…Smart home security…”
Get full text
Article