Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1081
Correlation Analysis Approach About Numerous Security Information and Event in Telecommunication Network
Published 2013-10-01Subjects: “…security operations centre…”
Get full text
Article -
1082
Standards of living and human potential development: Assessing risks to regions’ economic security
Published 2025-01-01Subjects: “…economic security…”
Get full text
Article -
1083
Legal Regulation of Interaction of Security Service of Ukraine with Civil Society in Counteracting Terrorism
Published 2019-09-01“…The comparative legal method of the study analyzes the source base of national law concerning the interaction of the Security Service of Ukraine with civil society in fighting against terrorism. …”
Get full text
Article -
1084
THE SECURITY ASPECT OF TURKEY-UNITED STATES RELATIONS: IN SEARCH FOR A NEW MODEL
Published 2016-04-01“…Security cooperation has always been an important aspect of the relations between Turkey and the USA. …”
Get full text
Article -
1085
Enhancing concealed object detection in active THz security images with adaptation-YOLO
Published 2025-01-01Subjects: “…Active terahertz (THz) security image…”
Get full text
Article -
1086
Aukus (Australia-united kingdom-united states) threat to Indo-pacific security
Published 2024-11-01“…Countries can change their defense budgets based on their assessment of security threats in the region and changes in the balance of power. …”
Get full text
Article -
1087
RUS DIŞ POLİTİKASINDA GÜVENLİK FAKTÖRÜ - SECURITY FACTOR IN RUSSIAN FOREIGN POLICY
Published 2019-06-01Subjects: Get full text
Article -
1088
Aerial reconfigurable intelligent surfaces-assisted full-duplex UAV secure communication
Published 2024-07-01Subjects: “…UAV secure communication…”
Get full text
Article -
1089
Secure-Network-Coding-Based File Sharing via Device-to-Device Communication
Published 2017-01-01“…In order to increase the efficiency and security of file sharing in the next-generation networks, this paper proposes a large scale file sharing scheme based on secure network coding via device-to-device (D2D) communication. …”
Get full text
Article -
1090
Exploiting Dual-Output Programmable Blocks to Balance Secure Dual-Rail Logics
Published 2010-01-01“…However, assessing the security level which can be achieved with them is an important issue, as it is directly related to the suitability to use commercial FPGA instead of proprietary custom FPGA for this kind of protection. …”
Get full text
Article -
1091
School space as a "safe space" and "secure space": Educational and architectural challenges
Published 2024-01-01Subjects: Get full text
Article -
1092
Successive relaying secure transmission scheme based on inter-relay interference cancellation
Published 2017-09-01“…A secure scheme based on inter-relay interference cancellation was proposed to solve untrusted relay eavesdropping problem in successive relaying systems.First inter-relay interference between trusted relay and untrusted relay was exploited as artificial noise to degrade untrusted relay’s eavesdropping condition,then interference iterative cancellation was adapted to improve signal quality at legitimate user by making use of correlation between signals in time domain.Based on this,a quick power allocation algorithm aiming to minimize untrusted relay’s sum rate was proposed.Analysis and simulation results show that the proposed scheme suppress untrusted relay’s eavesdropping without loss of communication efficiency,a promotion of at least 2 bit·s<sup>-1</sup>·Hz<sup>-1</sup>in secrecy rate can be observed.…”
Get full text
Article -
1093
Relevant Problems of Implementing State Policy in the Field of Ensuring Information Security of Ukraine
Published 2021-07-01Subjects: “…information security…”
Get full text
Article -
1094
Physical layer security of NOMA-D2D cooperative wireless system
Published 2022-09-01Subjects: Get full text
Article -
1095
Secure performance analysis of relay systems with multi-relay and multi-user selection
Published 2019-08-01Subjects: Get full text
Article -
1096
Research on Situation Awareness Model of Information Content Security Incidents in Telecommunication Network
Published 2014-02-01“…Aiming at the main features of the information content security incidents and telecommunication network themselves,a design of situation awareness model was presented.The model using distributed character data collection and hierarchical progressive integration,the status of security situation of the whole telecommunication network was analyzed.According to the structure of model,hierarchical information fusion proximate calculation based on evidence theory was used to resolve the problem of how to use the initial information to determine the probability in high level information fusion.The simulation results show that the model can compute fast in real time in high accuracy,and it can perceive and determine the incidents effectively.…”
Get full text
Article -
1097
Livelihood training, food production, and food security among vulnerable communities in Bangladesh
Published 2025-01-01“…Agriculture & Food Security…”
Get full text
Article -
1098
A Survey of Ontologies Considering General Safety, Security, and Operation Aspects in OT
Published 2024-01-01Subjects: Get full text
Article -
1099
Securely redundant scheduling policy for MapReduce based on dynamic domains partition
Published 2014-01-01Subjects: Get full text
Article -
1100
Global energy security: new challenges and prospects for Russian-American energy cooperation
Published 2010-08-01Get full text
Article