Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
801
THE ROLE OF INTERNATIONAL LEGAL INSTRUMENTS IN THE FORMATION OF A SECURITY ENVIRONMENT
Published 2024-05-01Subjects: “…security environment, international legal instrument, information security, international terrorism, international obligations.…”
Get full text
Article -
802
Logic-Based Security Architecture for Systems Providing Multihop Communication
Published 2013-01-01“…Security is a basic element of distributed systems such as ad hoc and sensor communication networks. …”
Get full text
Article -
803
Food Security in Nigeria: Enhancing Workers’ Productivity in Precision Agriculture
Published 2022-12-01Subjects: “…Food security…”
Get full text
Article -
804
Education as a Fundamental Element in Ensuring the National Security of the State
Published 2024-12-01Subjects: “…national security of the state…”
Get full text
Article -
805
Water security assessment framework for deltas of the transboundary river basins
Published 2023-07-01Subjects: Get full text
Article -
806
Novel Chaos Secure Communication System Based on Walsh Code
Published 2015-01-01Get full text
Article -
807
The migration-security nexus: desecuritization and the shift towards the sustainable approach
Published 2024-12-01Subjects: “…security…”
Get full text
Article -
808
Study on the Security Access Technology of Business Platform Communication Network
Published 2014-04-01Subjects: Get full text
Article -
809
Secure resource metering and accounting with hash chain in cloud storage
Published 2013-08-01“…Therefore, the trustworthiness between payer and service provider becomes a key factor for the business, and triggers security concerns. On the one hand, service providers or insiders may inflate the amount of re-source consumed to get more service charge. …”
Get full text
Article -
810
-
811
BSAMS: Blockchain-Based Secure Authentication Scheme in Meteorological Systems
Published 2023-03-01Subjects: Get full text
Article -
812
Fast anomalous traffic detection system for secure vehicular communications
Published 2024-12-01“…Despite its ubiquitous use, the CAN protocol lacks critical security features, making vehicle communications vulnerable to message injection attacks. …”
Get full text
Article -
813
Space-Terrestrial Integrated Multi-Identifier Network with Endogenous Security
Published 2020-12-01Subjects: Get full text
Article -
814
A Resilience-Based Security Assessment Approach for CBTC Systems
Published 2021-01-01“…The CBTC system ensures safe and efficient operation of trains, so the quantitative assessment of cyber security is quite necessary. In this paper, a resilience-based assessment method is proposed to analyze the security level of CBTC systems based on indicators of both the cyber domain and the physical domain. …”
Get full text
Article -
815
The role of financial analysis in ensuring economic security of agricultural enterprise
Published 2022-03-01Subjects: Get full text
Article -
816
Network security situation evaluation method for multi-step attack
Published 2017-01-01Subjects: Get full text
Article -
817
An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment
Published 2015-01-01“…Since the data needs to be secured throughout its life cycle, security of the data in cloud is a major challenge to be concentrated on because the data is in third party’s premises. …”
Get full text
Article -
818
Demographic crisis as a threat to the national security of the Russian Federation
Published 2012-10-01Subjects: Get full text
Article -
819
Secure network coding method merged with timestamp and homomorphic signature
Published 2013-04-01“…A secure network coding method merged with timestamp and homomorphic signature which can solve security issues in wireless multi-hop networks was proposed.The timestamp into RSA-based homomorphic signature scheme was brought and used to produce random coefficients of net it possible to defend pollution attacks and replay attacks simultaneously while maintaining the homomorphic property of the signature.The analysis that mainly focus on was the influence of random coefficients on decoding probability of network coding a security of the proposed scheme.Results indicate that the proposed scheme can defend pollution attacks and replay attacks simultaneously,and the ratio of overhead between RSA-based homomorphic signature scheme and the proposed scheme is approximates 1.…”
Get full text
Article -
820
Shaping the future of commercial quantum computer and the challenge for information security
Published 2016-03-01“…The modern cryptography still has strong security. Take the quantum devices constraints into consideration was proposed for the first time, the storage of former registers in the Shor algorithm should be 100 or less Qubits theoretically decreased from 1 000 or more Qubits. …”
Get full text
Article