Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1181
Advancing Food Security with Farmed Edible Insects: Economic, Social, and Environmental Aspects
Published 2025-01-01Subjects: Get full text
Article -
1182
Research on the data link layer secure protocol of TES network based on ECC
Published 2009-01-01Subjects: Get full text
Article -
1183
A Game-Based Secure Localization Algorithm for Mobile Wireless Sensor Networks
Published 2015-09-01“…To address these challenges, the paper presents a novel game-based secure localization algorithm. The nodes' strategy level can be indicated through the results of trust evaluation and then by means of constructing reasonable strategy space and payoff function using game theory; all kinds of nodes within the network can achieve the optimal payoffs. …”
Get full text
Article -
1184
Key Technology About Security Audit of Mobile Network Traffic for Telecom Operator
Published 2015-12-01Subjects: Get full text
Article -
1185
Concept and Classification of Functions of State Policy in the Field of Ensuring Economic Security of the State
Published 2020-02-01Subjects: “…national security…”
Get full text
Article -
1186
THE SIGNIFICANCE OF LEGAL REGULATION IN ENSURING CYBER SECURITY IN THE CONDITIONS OF WAR: EXPERIENCE FOR UKRAINE
Published 2024-05-01Subjects: “…national security…”
Get full text
Article -
1187
Strategic autonomy of Russia in the changing international environment and consequences for the regional security of the Balkans
Published 2024-01-01“…The aim of the research is to analyze the realization of Russia's strategic autonomy by applying the concept of extended deterrence for the regional security of the Balkans. For this, the methods of discourse analysis (direction of Russian policy) and content analysis (individual strategic documents and statements of representative officials), case studies (Balkan regional framework) and synthesis are used. …”
Get full text
Article -
1188
Risks and countermeasures of artificial intelligence generated content technology in content security governance
Published 2023-10-01Subjects: Get full text
Article -
1189
A Secure Cooperative Spectrum Sensing Scheme in Mobile Cognitive Radio Networks
Published 2014-06-01“…However, in existing works, the problem of secure CSS in mobile cognitive radio networks (CRNs) has not been well considered yet. …”
Get full text
Article -
1190
Security protocol code analysis method combining model learning and symbolic execution
Published 2021-10-01Subjects: Get full text
Article -
1191
RETRACTED: Energy security and sustainable development from the standpoint of energy paradigm of Iran
Published 2024-01-01Get full text
Article -
1192
Application of security threat intelligence based on big data analysis in telecom operators
Published 2020-11-01“…As a powerful tool for operators to deal with means of new attack and ever-changing security threats,threat intelligence is also the core power to transform traditional passive defense into active defense.The importance of threat intelligence to operators was introduced,the productive process of threat intelligence was analyzed in detail,and finally the typical application scenarios of threat intelligence were given,which could provide technical reference for telecom operators in the practice of threat intelligence.…”
Get full text
Article -
1193
New security model for cross-realm C2C-PAKE protocol
Published 2008-01-01Subjects: Get full text
Article -
1194
Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges
Published 2020-01-01“…Further different issues related specifically to the Internet of Things environment are discussed and the causes and effects pertaining to the security breach for Internet of Things are identified. …”
Get full text
Article -
1195
Investigating the security consequences of climate change on Iran with a Good Governance approach
Published 2024-12-01“…Due to its location in low latitudes, Iran is among the countries that has not been spared from the security consequences of climate change. The present study seeks to answer two questions: 1) What are the security consequences of climate change on Iran and which components have the greatest impact on Iran? …”
Get full text
Article -
1196
Interference alignment based secure transmission scheme in multi-user interference networks
Published 2023-06-01Subjects: Get full text
Article -
1197
Water Security in the Context of Sustainable Management of Transboundary Water Resources in the Caspian Region
Published 2023-11-01Subjects: “…water security…”
Get full text
Article -
1198
Novel Framework for Secure Data Aggregation in Precision Agriculture with Extensive Energy Efficiency
Published 2023-01-01“…Energy-efficient data transmission in PA via sensing technology is possible only when additional security measures are synchronized. Nevertheless, security considerations often introduce additional overhead. …”
Get full text
Article -
1199
A Quantitative Risk Evaluation Model for Network Security Based on Body Temperature
Published 2016-01-01“…These days, in allusion to the traditional network security risk evaluation model, which have certain limitations for real-time, accuracy, characterization. …”
Get full text
Article -
1200