Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1101
Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks
Published 2012-11-01“…An overview of supervisory control and data acquisition (SCADA) systems is presented and relevant security concerns are addressed. To secure IP-based SCADA systems, it is vital to implement secure architectures which prevent access to the SCADA from corporate IT, in addition to excellent management practices in managing IP-based networks. …”
Get full text
Article -
1102
Evaluating the network security by the Read<sub>W</sub>rite transition model
Published 2010-01-01Subjects: Get full text
Article -
1103
A secure message-passing framework for inter-vehicular communication using blockchain
Published 2019-02-01“…To address the issues, we proposed a secure distributed message-passing framework that does not require a centralized server, and it rates the credibility of message source using blockchain technology. …”
Get full text
Article -
1104
Secure supply and demand relationship perception routing in intermittently connected wireless networks
Published 2015-11-01Subjects: Get full text
Article -
1105
Research on trust sensing based secure routing mechanism for wireless sensor network
Published 2017-10-01Subjects: Get full text
Article -
1106
Data Security in Autonomous Driving: Multifaceted Challenges of Technology, Law, and Social Ethics
Published 2024-12-01Subjects: Get full text
Article -
1107
The India-US Security and Defense Cooperation under Narendra Modi: Challenges and Assessments
Published 2024-12-01Subjects: Get full text
Article -
1108
Lightweight and secure vehicle track verification scheme via broadcast communication channels
Published 2023-10-01Subjects: Get full text
Article -
1109
Wireless Secure Communication Based on Code Domain Space-Time Modulated Metasurface
Published 2024-12-01Subjects: Get full text
Article -
1110
Trusted coalition-proof protocol model based on secure multi-part computing
Published 2011-01-01Subjects: “…secure multi-part…”
Get full text
Article -
1111
Secure contact tracing platform from simplest private set intersection cardinality
Published 2022-09-01“…IET Information Security…”
Get full text
Article -
1112
Analysis of Water Quality Security in Beimiao Reservoir in Baoshan City in Yunnan Province
Published 2008-01-01Get full text
Article -
1113
Integration of Islamic Jurisprudence Principles within the UN Global Human Security Framework
Published 2024-12-01Subjects: Get full text
Article -
1114
A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization
Published 2015-02-01“…Recently, the development of smart phones has been reported the number of security vulnerabilities. Although these smart phones have a concept of Sandbox for the security, sensitive personal information has been still exposed by internal data exchange or root privilege acquisition. …”
Get full text
Article -
1115
The organisational structure of the economic security service of the enterprise and the main functions of its divisions
Published 2022-07-01Subjects: Get full text
Article -
1116
Cyber Security of the Economy and Public Finances: Historiography and Post-War Trajectory of Development
Published 2024-06-01Subjects: Get full text
Article -
1117
Secure password-based authentication scheme with anonymous identity without smart cards
Published 2008-01-01“…Rhee-Kwon-Lee’s password-based scheme without using smart cards is vulnerable to insider attack,password can’t be changed freely,and its computational cost is high.In order to fix all these security flaws,a new password-based authentication scheme with anonymous identity without using smart cards was presented.The security and computational efficiency of our scheme were improved by confusing the anonymous identity with user’s password and taking use of the timestamp.According to comparisons with other password authentication schemes without smart cards,our scheme not only fixes weaknesses of Rhee-Kwon-Lee’s scheme,but also satisfies all the security requirements for ideal password authentication without smart cards and is the better one in security performance and computational cost.…”
Get full text
Article -
1118
Security control scheme for cloud data copy based on differential privacy model
Published 2017-05-01“…In cloud computing environment,adversary may use data deduplication as a side channel to eavesdrop users’ privacy.In order to tackle this serious issue,a secure copy number control scheme was proposed.The highlights of the proposed scheme lie in constructing a hybrid cloud framework.Then file was encrypted for second times by using the privacy protection parameters of differential privacy as well as the key of the file computed by convergent encryption algorithm.After the file is uploaded,each file has only one copy in the server.Meanwhile,compared with the scheme that use setting threshold value to control the number of copies,the proposed scheme can resist against the side channel attack,related files attack,and the specific attack of encryption algorithm and save the network bandwidth and disk storage space.…”
Get full text
Article -
1119
NON-CONTRIBUTORY SOCIAL SECURITY APPLICATION FOR ELDERLY AND INDIVIDUALS WITH DISABILITIES’: THE CASE OF TURKEY
Published 2021-11-01Subjects: “…social security…”
Get full text
Article -
1120
Automatic generation of AppArmor security policies based on large language models
Published 2024-06-01Subjects: Get full text
Article