Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1321
Efficient handover authentication and secure key-updating mechanism for B5G networks
Published 2021-12-01Subjects: Get full text
Article -
1322
Statistical Characteristics and Security Analysis over Multi-Cascade κ-μ Shadowed Channels
Published 2022-01-01“…Moreover, we further utilize the two performance evaluation metrics including outage probability and intercept probability to investigate the impacts of cascade number and channel parameters on reliability and security. Finally, the theoretical results are consistent with the simulations, proving the correctness of the derivation. …”
Get full text
Article -
1323
HREATS OF ECONOMIC SECURITY OF INDUSTRIAL ORGANIZATIONS WHILE PROVIDING EQUIPMENT IN THE CONDITIONS OF IMPORT SUBSTITUTION
Published 2017-09-01Subjects: Get full text
Article -
1324
APPLICATION OF A METHOD OF LINEAR CONVOLUTION OF CRITERIA BY OPTIMIZATION OF FINANCIAL SECURITY OF ACTIVITY OF THE ORGANIZATION
Published 2017-01-01Subjects: “…optimization of financial security…”
Get full text
Article -
1325
The evolution of the Gulf Coopera-tion Council approaches to security issues after the Arab Spring
Published 2022-01-01Subjects: Get full text
Article -
1326
Delay-Tolerant, Low-Power Protocols for Large Security-Critical Wireless Sensor Networks
Published 2012-01-01“…This paper reports the analysis, implementation, and experimental testing of a delay-tolerant and energy-aware protocol for a wireless sensor node, oriented to security applications. The solution proposed takes advantages from different domains considering as a guideline the low power consumption and facing the problems of seamless and lossy connectivity offered by the wireless medium along with very limited resources offered by a wireless network node. …”
Get full text
Article -
1327
Three-dimensional spherical model based XML communication protocols security evaluation method
Published 2013-03-01Subjects: Get full text
Article -
1328
A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment
Published 2013-03-01“…This paper identifies vulnerabilities responsible for well-known network based attacks on cloud and does a critical analysis on the security measures available in cloud environment. This paper focuses on a nonconventional technique for securing cloud network from malicious insiders and outsiders with the use of network profiling. …”
Get full text
Article -
1329
The politics of gating (A response to Private Security and Public Space by Manzi and Smith-Bowers)
Published 2008-05-01“…Critically then the risk is that ignoring the political and normative aspects of gating, as I believe Manzi and Smith-Bowers do, may lead to further and deeper socio-spatial segregation that itself excludes the voice of social groups least able to challenge or, indeed, reside in gated developments and the additional security that they appear to offer. …”
Get full text
Article -
1330
A secure transmission method based on cooperative jamming for correlated main and wiretap channels
Published 2021-06-01Subjects: “…physical layer security…”
Get full text
Article -
1331
Transformation of the fuel and energy complex to ensure Russia’s energy security in the era of sanctions restrictions
Published 2023-11-01Subjects: Get full text
Article -
1332
Performance analysis and power optimization for FH secure communication under frequency and phase mismatch
Published 2022-09-01“…The artificial noise (AN) shielded frequency hopping (FH) secure communication can counteract electromagnetic interference and wiretapping, but its carrier frequencies change rapidly within a wide bandwidth which will raise the level of carrier frequency offset and phase noise, yielding AN cancellation performance degradation.To tackle this, the signal distortion caused by frequency and phase mismatch (FPM) was mathematically modeled, the AN cancellation performance was evaluated via signal-to-noise ratio, and the system secrecy was scaled via secrecy capacity.On basis of this, the optimal power allocation scheme for AN and confidential signal was designed, and the scheme was expanded according to the FPM level and the propagation channel quality.Numerical simulations verify that FPM can significantly degrade the noise cancellation performance and system secrecy, and to counteract this, the power ratio of AN to confidential signals should decrease with an increasing FPM.…”
Get full text
Article -
1333
Organizational Flexibility and Financial Performance: A Case Study of Social Security Branches in Tehran
Published 2021-05-01Subjects: Get full text
Article -
1334
Water security in North Carolina’s most economically insecure county: a case study
Published 2025-01-01Subjects: “…water security…”
Get full text
Article -
1335
Secure and efficient token based roaming authentication scheme for space-earth integration network
Published 2018-05-01“…Aiming at the problem of prolongation and instability of satellite and terrestrial physical communication links in the space-earth integration network,a two-way token based roaming authentication scheme was proposed.The scheme used the characteristics of the computing capability of the satellite nodes in the network to advance the user authentication process from the network control center (NCC) to the access satellite.The satellite directly verified the token issued by the NCC to verify the user's identity.At the same time,the token mechanism based on the one-way accumulator achieved the user's dynamic join,lightweight user self-service customization and billing,and the introduction of Bloom Filter enabled effective user revocation and malicious access management.Compared with the existing scheme,the scheme can guarantee the security of roaming authentication and significantly reduce the calculation and communication overhead of the authentication and key negotiation process.…”
Get full text
Article -
1336
Impact of Fisheries Exports on the Participation of Fisheries in Ensuring Food Security of the Country and the Arctic Region
Published 2024-12-01Subjects: Get full text
Article -
1337
Text Categorization Approach for Secure Design Pattern Selection Using Software Requirement Specification
Published 2018-01-01Subjects: Get full text
Article -
1338
Femtosecond Laser‐Induced Recrystallized Nanotexturing for Identity Document Security With Physical Unclonable Functions
Published 2025-01-01“…Abstract Counterfeit identity (ID) documents pose a serious threat to personal credit and national security. As a promising candidate, optical physical unclonable functions (PUFs) offer a robust defense mechanism against counterfeits. …”
Get full text
Article -
1339
Advanced Malware Detection: Integrating Convolutional Neural Networks with LSTM RNNs for Enhanced Security
Published 2024-12-01Get full text
Article -
1340
An intelligent attention based deep convoluted learning (IADCL) model for smart healthcare security
Published 2025-01-01Subjects: Get full text
Article