Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
881
Multidimensional Determinants of National Food Security in Azerbaijan: an Application of the ARDL Approach
Published 2019-12-01“…The attainment of food security is crucial and is a prime development priority for all developing countries. …”
Get full text
Article -
882
Knowledge graph based ubiquitous power IoT security visualization technology
Published 2019-11-01Subjects: Get full text
Article -
883
Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS
Published 2016-01-01“…Security proof, security analysis, and experimental results demonstrate that our proposed scheme gains enhanced security and more efficiency than Kim’s previous scheme while inheriting its qualities of one-round communication and security properties.…”
Get full text
Article -
884
AN ASSESSMENT OF CIVIL-MILITARY RELATIONS AND ITS IMPLICATIONS ON NIGERIA'S NATIONAL SECURITY
Published 2022-05-01“…This has continued to contribute to the present level of national insecurity in Nigeria, further exposing and affecting the security architecture of the Nigerian state. …”
Get full text
Article -
885
QR code security management system based on WPKI and iris recognition
Published 2018-05-01“…Aiming at the deficiency of existing QR code security technology,a security management system based on WPKI and iris recognition was designed and implemented.The system uses digital certificates to sign the hashed information for the user to verify the source of the QR code based on WPKI technology.Through the public security household registration management system,WPKI/CA system,server and mobile client four subsystems to standardize the management of the production and identification of QR code,and the application for the certificate of the user real name certification combined with biometric identification technology,indirectly realizing the binding of digital certificates and user physical identities to form a set of accountability mechanisms.Test results show that the system can meet accuracy and robustness requirements.…”
Get full text
Article -
886
Enhancing IoT security in smart grids with quantum-resistant hybrid encryption
Published 2025-01-01“…However, this integration also introduces significant security challenges, particularly data encryption. …”
Get full text
Article -
887
Prospect of secure-efficient search and privacy-preserving mechanism on big data
Published 2016-04-01Subjects: Get full text
Article -
888
Motorcycle Parking Security System based on Website and QR Code Technology
Published 2023-09-01Subjects: “…Motorcycle; Security; Microcontroller ESP32; Website; Motor servo…”
Get full text
Article -
889
Social diagnostics of information security of digital society: methodological and regulatory aspects
Published 2020-02-01Subjects: Get full text
Article -
890
Reinforcement Learning-Based Generative Security Framework for Host Intrusion Detection
Published 2025-01-01“…Thus, it is indispensable to configure a security system that accurately detects attacks on each user’s system. …”
Get full text
Article -
891
Method for Information Security Events Detection in a Cloud Signature Systems
Published 2024-06-01Subjects: Get full text
Article -
892
LINEAR FILTERING OF OUTPUT DATA OF A SINGLE-POSITION SECURITY SYSTEM
Published 2017-10-01Subjects: Get full text
Article -
893
The Development of the US National Missile Defense and its Impact on the International Security
Published 2015-02-01“…The major threat to international security is the proliferation of ballistic missiles and weapons of mass destruction. …”
Get full text
Article -
894
Promoting Agricultural Research and Development to Strengthen Food Security in South Asia
Published 2014-01-01“…This study also depicts the current situation of food security in South Asia and illustrates how agricultural education and innovation hold the master key to solve the food security issues for the world's most densely populated region.…”
Get full text
Article -
895
Security Data Aggregation with Recoverable Data in Heterogeneous Wireless Sensor Network
Published 2013-11-01“…Recently, many security aggregation algorithms in wireless sensor network have high communication overhead and the usage of aggregation functions is constrained. …”
Get full text
Article -
896
Discuss on cultivating mode of information security and law inter-disciplinary talents
Published 2019-06-01Subjects: “…talents of cyber security…”
Get full text
Article -
897
CHURCH RESPONSE TO SECURITY CHALLENGES IN THE 21ST CENTURY: THE NIGERIAN EXPERIENCE
Published 2023-07-01Subjects: Get full text
Article -
898
Analysis and Application of Security Risk Management Based on Business Process Granularity
Published 2013-11-01Subjects: “…security risk management…”
Get full text
Article -
899
Artificial noise aided secure beamforming for multi-antenna relay systems
Published 2014-11-01“…,the relaxation is tight to the original problem.Simulation results demonstrate that the proposed method can improve the security performance of the system significantly.…”
Get full text
Article -
900
Embracing plant plasticity or robustness as a means of ensuring food security
Published 2025-01-01“…In doing so we address both fundamental questions regarding G×E and potential strategies to best secure yields in both current and future climate scenarios.…”
Get full text
Article