Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1241
A network security situation prediction method based on hidden Markov model
Published 2015-12-01Subjects: “…network security situation prediction…”
Get full text
Article -
1242
Consequences of changing regional integration on environmental development, agricultural markets, and food security
Published 2023-10-01Subjects: Get full text
Article -
1243
Modeling and verifying based on timed automata of Internet of things gateway security system
Published 2018-03-01Subjects: Get full text
Article -
1244
Secure and verifiable outsourcing of determinant computing in the cloud and its electronic trading scheme
Published 2016-11-01“…In view of the problem that users’ informations are leaked and tampered possiblely exists at service terminal in existing outsourcing cloud computing protocols,a secure efficient and verifiable outsourcing protocol about determinant computing in the cloud was proposed.Firstly,the outsourcing computing protocol was based on the fuzz matrix technology and needed not under the premise of any difficulty assumptions to ensure the security of users’ informations.Secondly,by means of generating a special kind of transformation matrixes to deal with plaintext matrix,then after the users receive the returned results,the correctness of these results can be verified effectively,and the performance analysis shows this protocol can effectively improve the efficiency of outsourcing cloud computing.Finally,an electronic trading framework for determinant outsourcing computing was proposed,which could be effectively applied to e-commerce and other fields.…”
Get full text
Article -
1245
Business or Security? Goals and Decision-Making Inside the French Oil Policy of the 1920s
Published 2022-03-01Subjects: Get full text
Article -
1246
Methods of security situation prediction for industrial internet fused attention mechanism and BSRU
Published 2022-02-01Subjects: Get full text
Article -
1247
-
1248
Research on the chaotic secure communication of the phase-space symmetric Lorenz oscillator group
Published 2019-05-01Subjects: Get full text
Article -
1249
Legal support for information security of legal entities under Lithuanian and Ukrainian legislation
Published 2023-12-01Subjects: “…information security…”
Get full text
Article -
1250
Research on Security Algorithm for Crossing Heterogeneous Network Based on Unified Communication Technology
Published 2013-12-01“…Due to the unified protocol specification, encryption, and firewalls and other security measures at present, communication within the network environment are in good usability and security in heterogeneous network environment. …”
Get full text
Article -
1251
EBS-based efficient and secure group key management in wireless sensor networks
Published 2009-01-01“…To achieve the secure group communication in wireless sensor networks(WSN), a EBS-based group key management scheme was presented.First, the network topology was simplified by combining the chain-clusters and the star-clusters.Next, to prevent the adversary uncover all the administrative keys by a few colluding sensors, the number of sensors needed to capture WSN was increased.Then, the sensors of key combinations distribution were sorted through a coloring algorithm.Based on all these operations, the presented scheme distributed the administrative keys based on the hamming distance and EBS.Furthermore, the approaches handling the join event and leave event were described.Two experiments were performed to study the potential for collusions and the influence of size of compromised nodes on the effectiveness against collusions.Simulation results demonstrate that the presented scheme boosts the WSN’ resilience to attacks.The performance evaluation on join event and leave event shows that the number of key-updating messages and storage of sensors in the proposed scheme are fewer than those of SHELL.…”
Get full text
Article -
1252
Secure performance analysis of WCDMA systems over correlated Nakagami fading channels
Published 2018-10-01Subjects: “…physical layer security…”
Get full text
Article -
1253
Physical layer security for SWIPT-NOMA system in presence of randomly located eavesdroppers
Published 2022-03-01Subjects: Get full text
Article -
1254
CYBER SECURITY ANALYSIS OF IOT DEVICES TRANSMITTING DATA IN THE THINGSPEAK PLATFORM CLOUD
Published 2022-10-01Subjects: “…IoT security, sniffing IoT attacks, ThingSpeak, IoT, IoT attacks…”
Get full text
Article -
1255
Using random subcarrier weighting for multi-carrier systems physical layer security
Published 2012-10-01Subjects: Get full text
Article -
1256
A Secure and Robust Machine Learning Model for Intrusion Detection in Internet of Vehicles
Published 2025-01-01“…Although these technologies provide unparalleled connectivity and communication capabilities, they also introduce new security challenges, particularly in terms of Intrusion Detection. …”
Get full text
Article -
1257
Identity-based domain key distribution protocol in the E-document security management
Published 2012-05-01Subjects: Get full text
Article -
1258
Research and practice of software-defined security technology architecture in the 5G+ era
Published 2021-12-01Subjects: “…software-defined security…”
Get full text
Article -
1259
A gendered analysis of adaptive capacity and food security in Makueni County, Kenya
Published 2025-01-01Subjects: Get full text
Article -
1260
Azerbaijan-Türkiye Relations in the Context of Security Community: One Nation, Two States
Published 2024-12-01Subjects: “…security community…”
Get full text
Article