Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
821
SECURITY OF LIVES, RIGHTS TO PEACEFUL ASSEMBLY AND THE ENDSARS PROTEST IN NIGERIA
Published 2023-07-01Subjects: “…Human Security…”
Get full text
Article -
822
The Role of the United Nations Security Council in the Protection of Cultural Heritage
Published 2024-09-01Subjects: Get full text
Article -
823
Verification of serialising instructions for security against transient execution attacks
Published 2023-07-01“…However, errors and Trojans in the hardware implementation of lfence can be exploited to compromise the software mitigations that use lfence. The aforementioned security gap has not been identified and addressed previously. …”
Get full text
Article -
824
Research on bionic mechanism based endogenous security defense system
Published 2021-02-01Subjects: “…endogenous security…”
Get full text
Article -
825
THE U.S. NATIONAL SECURITY COUNCIL IN CONTEMPORARY AMERICAN INTERNATIONAL STUDIES
Published 2016-08-01Subjects: Get full text
Article -
826
Aggregation Scheme with Secure Hierarchical Clustering for Wireless Sensor Networks
Published 2012-07-01“…Due to our IP naming rules and type 1 nodes as cluster heads, public key cryptography, such as RSA (Rivest, Shamir, Adleman), or ECC (Elliptic Curve Cryptosystem), is easily implanted to our system to strengthen our security. The sink node is the only certification authority in our system, but n level cluster heads can be extended to n level certification authorities if needed, where n is maximum number of level.…”
Get full text
Article -
827
The Role of Infrastructure Projects of European Central Bank in Development of Financial Integration in EU
Published 2012-02-01Subjects: Get full text
Article -
828
-
829
Data recommendation algorithm of network security event based on knowledge graph
Published 2023-12-01Subjects: Get full text
Article -
830
RETRACTED: New technologies for the creation of an automatic security and fire alarm system
Published 2024-01-01Get full text
Article -
831
Enhancing Security in International Data Spaces: A STRIDE Framework Approach
Published 2024-12-01“…Regulatory and technological frameworks such as International Data Spaces (IDS) have been developed to facilitate secure data exchange while integrating security and data sovereignty aspects required by laws and regulations, such as the GDPR and NIS2. …”
Get full text
Article -
832
Wi-Fi security evaluation model based on BP neural network
Published 2016-10-01Subjects: Get full text
Article -
833
Key technology and application of intelligent connected patrol vehicles for security scenario
Published 2020-04-01“…Practical applications combined with industry scene is a common problem in the present artificial intelligence technology.Facing the security application scenario,the practice landing of unmanned technology -- intelligent connected patrol vehicle was studied.Integrating different sensors such as camera,LiDAR,inertial navigation system (INS),etc,the awareness system can accurately identify the platform itself,road conditions and target behavior using key technology such as artificial intelligence (AI),data fusion.Combining human intelligence (HI) in scene cognition of human experience and artificial intelligence (AI) in cognition of computing,a hybrid intelligent cognitive system using to security scene was built.Based on human in the loop system architecture and technology such as 5G ,vehicle to everything (V2X),edge computing,etc,different interactions between human ,machine and environment were designed,which ensured the safe and reliable operation of the system and increased the work efficiency by a wide margin.…”
Get full text
Article -
834
Enhanced Lightweight Quantum Key Distribution Protocol for Improved Efficiency and Security
Published 2025-01-01“…Quantum Key Distribution (QKD) provides secure communication by leveraging quantum mechanics, with the BB84 protocol being one of its most widely adopted implementations. …”
Get full text
Article -
835
Research on LoRa network security schemes based on RF fingerprint
Published 2021-12-01Subjects: Get full text
Article -
836
A Security Authentication Protocol for Trusted Domains in an Autonomous Decentralized System
Published 2016-03-01“…By applying BAN predicate logic and AVISPA security analysis tool of network interaction protocol, we can guarantee protocol security and provide complete safety tests. …”
Get full text
Article -
837
An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security
Published 2023-09-01“…However, IIoT involves some security vulnerabilities that are more damaging than those of IoT. …”
Get full text
Article -
838
Crop Diversification for Ensuring Sustainable Agriculture, Risk Management and Food Security
Published 2025-02-01Subjects: Get full text
Article -
839
Adjusted automata learning algorithm for security protocol adaptive model checking
Published 2015-11-01Subjects: “…security protocol…”
Get full text
Article -
840
Task scheduling optimization strategy for roadside unit based on security strength
Published 2024-04-01Subjects: Get full text
Article