Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1221
Design and analysis of intelligent service chain system for network security resource pool
Published 2022-08-01Subjects: Get full text
Article -
1222
-
1223
Privacy-preserving security of IoT networks: A comparative analysis of methods and applications
Published 2025-12-01Subjects: “…Privacy-preserving security…”
Get full text
Article -
1224
Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device
Published 2014-01-01“…In this paper, we propose the secure locking screen using time pattern (SLSTP) focusing on improved security and convenience for users to support human-centric multimedia device completely. …”
Get full text
Article -
1225
A Low-Overhead and High-Security Scan Design Based on Scan Obfuscation
Published 2024-01-01“…In this paper, we propose a low overhead secure scan design based on scan obfuscation. In this method, to increase the security of the design, we insert a set of fuse-antifuse cells (CF) controlled by the obfuscation key between the scan flip flops (SFF) and add a controller at the scan-out port. …”
Get full text
Article -
1226
Optimal defense strategy based on the mean field game model for cyber security
Published 2019-02-01“…With the evolution of research on defense strategies in cyber security, the choice of an optimal strategy has become a key problem in current studies. …”
Get full text
Article -
1227
5G carrier network data collection and security management evolution ideas
Published 2020-09-01Subjects: Get full text
Article -
1228
AI-based model for securing cognitive IoT devices in advance communication systems
Published 2025-12-01“…These security challenges are exacerbated by IoT devices’ limited computational resources and storage capacities, rendering traditional security protocols ineffective. …”
Get full text
Article -
1229
Designing an internet of things laboratory to improve student understanding of secure IoT systems
Published 2024-01-01“…The instructional lab material has been uploaded to the web portal https://clark.center designated by the National Security Agency for dissemination. Our approach, design, and experimental validation methodology will be useful for educators, researchers, students, and organizations interested in re-skilling their workforce.…”
Get full text
Article -
1230
Quantitative threat situational assessment method for higher secure attribute value device
Published 2020-10-01Subjects: Get full text
Article -
1231
Secure authentication enhancement scheme for seamless handover and roaming in space information network
Published 2019-06-01Subjects: Get full text
Article -
1232
TECHNICAL EDUCATION AS A PANACEA FOR CURBING BANDITRY AND SECURITY CHALLENGES IN NORTHWEST NIGERIA
Published 2025-01-01Subjects: Get full text
Article -
1233
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
Published 2016-05-01Subjects: Get full text
Article -
1234
RETRACTED: Application of simulation modeling in ensuring economic security in feed additives production
Published 2024-01-01Get full text
Article -
1235
The Effectiveness of Emotion-Focused Therapy on Psychological Security in Women Involved in Domestic Violence
Published 2024-03-01Subjects: Get full text
Article -
1236
Privacy-preserving ADP for secure tracking control of AVRs against unreliable communication
Published 2025-01-01Get full text
Article -
1237
Management of receivables and payables as an element of ensuring the economic security of an enterprise: practical aspects
Published 2023-02-01Subjects: Get full text
Article -
1238
Economic security as a driver of Russian exclave development in alignment with national interests
Published 2024-01-01Subjects: “…economic security…”
Get full text
Article -
1239
Securing Maritime Autonomous Surface Ships: Cyber Threat Scenarios and Testbed Validation
Published 2025-01-01Get full text
Article -
1240
An Analysis of the Impact of the Syrian Crisis on Turkey’s Politic-Military, Social and Economic Security
Published 2020-06-01Subjects: Get full text
Article