Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
981
Research on the game of information security investment based on the Gordon-Loeb model
Published 2018-02-01Subjects: “…information security investment…”
Get full text
Article -
982
A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices
Published 2011-01-01“…Next to a FPGA-based hardware architecture, we focus on a secure scheme for key flashing of public keys to highly mobile systems. …”
Get full text
Article -
983
TVD‐PB logic circuit based on camouflaging circuit for IoT security
Published 2022-01-01“…A logic camouflaging circuit is proposed that uses a balanced power consumption and threshold voltage‐defined technique to provide an antiphysical attack scheme to protect the hardware security for IoT devices. The proposed circuit uses a symmetric differential pull‐down network in implementing the different logic functions through the threshold voltage reconfiguration circuit. …”
Get full text
Article -
984
International Experience in Assessing Economic Security: Basic Approaches and Opportunities for Ukraine
Published 2020-06-01Subjects: Get full text
Article -
985
Secure deployment strategy of virtual machines based on operating system diversity
Published 2017-10-01Subjects: Get full text
Article -
986
Military medicine and morale: Perceptions of inequities in triage impact national security
Published 2024-09-01Get full text
Article -
987
A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings
Published 2014-01-01“…Proxy signcryption scheme provides a secure privilege delegation mechanism for a person to delegate his privilege to his proxy agent to accomplish things. …”
Get full text
Article -
988
Constructionof Security of Monitoring Platform in Electric Power Dispatching Internal Network
Published 2014-01-01Subjects: Get full text
Article -
989
A Secure RFID Authentication Protocol Adopting Error Correction Code
Published 2014-01-01“…RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. …”
Get full text
Article -
990
Research on industrial Internet security detection and response based on digital twin
Published 2024-06-01“…Considering that traditional network security defense methods cannot meet the strict requirements of industrial Internet for reliability and stability, a method for anomaly detection and response in digital space was studied based on the idea of digital twins by collecting on-site data and using twin model security cognition. …”
Get full text
Article -
991
Approach to making strategies for network security enhancement based on attack graphs
Published 2009-01-01Subjects: “…network security…”
Get full text
Article -
992
Identifying and Ranking Security Indicators in Online Social Networks with an MADM Technique
Published 2022-11-01Subjects: Get full text
Article -
993
A flexible and secure protocol framework for industrial internet of smart things
Published 2020-07-01Subjects: Get full text
Article -
994
RETRACTED: Environmental expertise and its importance for ensuring natural resource security
Published 2024-01-01Get full text
Article -
995
A data pipeline for secure extraction and sharing of social determinants of health.
Published 2025-01-01“…<h4>Discussion and conclusion</h4>We describe a novel pipeline that can facilitate the secure acquisition and sharing of neighborhood-level SDOH without sharing PHI. …”
Get full text
Article -
996
THE NEXUS BETWEEN ARMED CONFLICT, SECURITY, PEACE EDUCATION AND DEVELOPMENT IN NIGERIA
Published 2023-09-01“… This paper examines the interconnection between armed conflict, security, education, peace, and development in Nigeria. …”
Get full text
Article -
997
Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
998
Constructing RBAC Based Security Model in u-Healthcare Service Platform
Published 2015-01-01“…In this paper, we examine security requirements related to privacy protection in u-healthcare service and propose an extended RBAC based security model. …”
Get full text
Article -
999
Provable security EPC information service communication scheme for EPC network
Published 2013-08-01“…To resolve the security drawbacks of EPC information services, a provable security EPC information service communication scheme—ESCM was designed. …”
Get full text
Article -
1000
Secure beamforming design for IRS-assisted SWIPT Internet of things system
Published 2021-04-01Subjects: Get full text
Article