Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1281
Access to information about the activities of the Security Service of Ukraine in the context of countering disinformation
Published 2022-06-01Subjects: Get full text
Article -
1282
Blockchain applications in managing oral oncology patient data: Privacy, security, and beyond
Published 2024-06-01Get full text
Article -
1283
Application research on network security operation automation practice based on RPA technology
Published 2024-07-01Subjects: Get full text
Article -
1284
VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION
Published 2014-06-01Subjects: “…information security…”
Get full text
Article -
1285
Research on endogenous security data sharing mechanism of F-RAN for 6G
Published 2021-01-01Subjects: Get full text
Article -
1286
Multi-source data security protection of smart grid based on combination key
Published 2020-01-01Subjects: Get full text
Article -
1287
ENVIRONMENTAL EXTREMISM AS A NEW CHALLENGE OF ECONOMIC SECURITY OF INDUSTRIAL ORGANIZATIONS IN RUSSIA
Published 2016-06-01Subjects: Get full text
Article -
1288
Efficient and secure multi-user outsourced image retrieval scheme with access control
Published 2021-10-01“…In the cloud-based image retrieval services, the cloud server may not be fully trusted in which may arise privacy concerns.Some privacy-preserving image retrieval schemes have been proposed to protect image privacy.However, the traditional privacy-preserving image retrieval schemes have some weaknesses, such as inefficient and single-user setting.Therefore, an efficient and secure multi-user outsourced image retrieval (EMIR) scheme with access control was proposed.EMIR utilized matrix decomposition and proxy re-encryption to achieve multi-user outsourced image retrieval.By leveraging the techniques of one-time pad and matrix transformation, EMIR supported efficient and secure image retrieval based on Euclidean distance similarity in a privacy-preserving manner.In addition, EMIR applied locality sensitive hashing (LSH) to build searchable indexes in a privacy-preserving manner, which could improve the image retrieval performance.Specifically, a lightweight access control strategy by using role-based polynomial function was designed to authorize the legality of the query user.Security analysis shows that EMIR can protect the confidentiality of the images and the queries.The extensive experiments demonstrate that EMIR achieves efficient image retrieval.…”
Get full text
Article -
1289
Goodness-of-Fit Based Secure Cooperative Spectrum Sensing for Cognitive Radio Network
Published 2014-01-01Get full text
Article -
1290
The Effect of HIV/AIDS Scourge on Food Security in Nyabbani Subcounty, Kitagwenda District.
Published 2023“…The purpose of this research was to assess, analyze, find out, and gather the effect of HIV/AIDS scourge on food security in Nyabbani sub-county, Kitagwenda district.…”
Get full text
Thesis -
1291
Impact of Climate Change on Food Security in Kashare Sub-County, Mbarara District.
Published 2024Subjects: Get full text
Thesis -
1292
Impact of Climate Change on Food Security in Kashare Sub-County Mbarara District.
Published 2024Subjects: Get full text
Thesis -
1293
Transport Systems Tracking and Inventory Security: A Case of Mega Bakery, Kabale.
Published 2025Subjects: Get full text
Thesis -
1294
-
1295
Empirical and methodological foundations on the impact of climate-smart agriculture on food security studies: Review
Published 2025-01-01Subjects: Get full text
Article -
1296
New time-frequency method of harmonic signal extraction in chaotic secure communication system
Published 2011-01-01Get full text
Article -
1297
Defending against social engineering attacks: A security pattern‐based analysis framework
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
1298
Secure and high throughput routing protocol with QoS constraints in cognitive wireless Mesh networks
Published 2014-11-01Subjects: Get full text
Article -
1299
Cyber security entity recognition method based on residual dilation convolution neural network
Published 2020-10-01“…In recent years,cybersecurity threats have increased,and data-driven security intelligence analysis has become a hot research topic in the field of cybersecurity.In particular,the artificial intelligence technology represented by the knowledge graph can provide support for complex cyberattack detection and unknown cyberattack detection in multi-source heterogeneous threat intelligence data.Cybersecurity entity recognition is the basis for the construction of threat intelligence knowledge graphs.The composition of security entities in open network text data is very complex,which makes traditional deep learning methods difficult to identify accurately.Based on the pre-training language model of BERT (pre-training of deep bidirectional transformers),a cybersecurity entity recognition model BERT-RDCNN-CRF based on residual dilation convolutional neural network and conditional random field was proposed.The BERT model was used to train the character-level feature vector representation.Combining the residual convolution and the dilation neural network model to effectively extract the important features of the security entity,and finally obtain the BIO annotation of each character through CRF.Experiments on the large-scale cybersecurity entity annotation dataset constructed show that the proposed method achieves better results than the LSTM-CRF model,the BiLSTM-CRF model and the traditional entity recognition model.…”
Get full text
Article -
1300
National, International and Legal Mechanisms of Control over the Activity of Non-Government Security Entities
Published 2019-06-01Subjects: Get full text
Article