Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1301
Review of climate-resilient agriculture for ensuring food security: Sustainability opportunities and challenges of India
Published 2025-02-01Subjects: Get full text
Article -
1302
Multi-objective optimization placement strategy for SDN security controller considering Byzantine attributes
Published 2021-06-01Subjects: “…software defined network security…”
Get full text
Article -
1303
-
1304
Brain activity patterns reflecting security perceptions of female cyclists in virtual reality experiments
Published 2025-01-01“…Existing literature highlights that women’s willingness to use bicycles is significantly influenced by their perception of security. This study employs virtual reality (VR) cycling simulation and electroencephalography (EEG) analysis to investigate factors influencing female cyclists’ perceptions of security in Tehran. …”
Get full text
Article -
1305
CS-FL: Cross-Zone Secure Federated Learning with Blockchain and a Credibility Mechanism
Published 2024-12-01“…To address these challenges, this paper proposes a cross-zone secure federated learning method with blockchain and credibility mechanism, named CS-FL. …”
Get full text
Article -
1306
Adaptive Conflict-Free Optimization of Rule Sets for Network Security Packet Filtering Devices
Published 2015-01-01“…Packet filtering and processing rules management in firewalls and security gateways has become commonplace in increasingly complex networks. …”
Get full text
Article -
1307
Researcb on Network Security Monitoring Model and Associated Algoritbm in tbe Age of Big Data
Published 2014-07-01Subjects: Get full text
Article -
1308
Enhanced Image Security through 4D Hyperchaotic System and Hybrid Key Techniques
Published 2024-11-01“…This study develops a digital image encryption method using a 4D hyperchaotic system combined with a hybrid key to maximize data security. By generating a random and uniform pixel distribution, the method makes decryption significantly harder for unauthorized access. …”
Get full text
Article -
1309
An investigation of feature reduction, transferability, and generalization in AWID datasets for secure Wi-Fi networks.
Published 2025-01-01“…The practical implications of this research are crucial for the secure automation of wireless intrusion detection frameworks and tools in personal and enterprise paradigms.…”
Get full text
Article -
1310
Collaborative security assessment of cloud-edge-device distributed systems based on order parameters
Published 2024-06-01Subjects: Get full text
Article -
1311
R~2BAC:a risk-based multi-domain secure interoperation model
Published 2008-01-01Subjects: Get full text
Article -
1312
Secure hidden keyword searchable encryption schemewith fine-grained and flexible access control
Published 2013-08-01“…Moreover, the suggested system has the function to add and revoke user. Security analysis shows that the scheme could not only prevent the leakage of private data but also hide the information of keywords. …”
Get full text
Article -
1313
Exploring climate change resilience of major crops in Somalia: implications for ensuring food security
Published 2024-12-01Subjects: Get full text
Article -
1314
Information acquisition strategy for security gate-ways based on swing door trending algorithm
Published 2018-10-01“…Acquisition the control information of security gateway is an important security awareness method in the space and earth integrated network,but the traditional equal interval time data method acquisition has problems,such as waste of network bandwidth,a large amount of data redundancy,excessive data collection of acquisition node and excessive transmission times.In order to solve these problems,a data acquisition strategy based on improved swing door trending algorithm was proposed,which analyzed and improved swing door trending algorithm to determine the control information of security gateway such as the rangeability of gateway traffic and CPU utilization,and to adjust the data acquisition interval adaptively.The experimental results show that compared with the traditional equal interval time data method acquisition,under the condition of ensuring the data accuracy,the proposed strategy can lower the times of data acquisition and transmission,effectively reduce network overhead and improve data acquisition efficiency.…”
Get full text
Article -
1315
Introducing maximum sustainable yield targets in fisheries could enhance global food security
Published 2025-01-01“…Abstract Aquatic foods are crucial for global food and nutrition security, but overfishing has led to depleted fish stocks, threatening both food security and the environment. …”
Get full text
Article -
1316
Transitional justice mechanisms and processes: international experience for restoring Ukraine’s sovereignty and national security
Published 2023-09-01Subjects: “…security…”
Get full text
Article -
1317
Assessment of the food security level in the regions of the European North of Russia based on benchmarking methodology
Published 2020-12-01Subjects: Get full text
Article -
1318
EN-Bypass: a security assessment method on e-mail user interface notification
Published 2023-06-01Subjects: Get full text
Article -
1319
-
1320
Discussion on Small Probability Correlation Analysis Technique of Security Audit System for Telecom Operator
Published 2013-04-01Subjects: “…security audit…”
Get full text
Article