Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
121
Survey on network security based on blockchain
Published 2018-03-01Subjects: “…network security…”
Get full text
Article -
122
The status of the Prime Minister in the sphere of security
Published 2024-12-01Subjects: “…security…”
Get full text
Article -
123
-
124
Development of the Japanese Environmental Security Concept
Published 2015-06-01Subjects: Get full text
Article -
125
-
126
Virtualization security:the good,the bad and the ugly
Published 2016-10-01Subjects: “…virtualization security…”
Get full text
Article -
127
Right of Access to Information and Media Security
Published 2019-10-01“…With the development of virtual law institutions, the priority of media security is to preserve the superiority of creative works created by man over the results of computer processing of information. …”
Get full text
Article -
128
Wireless secure enhancement with cooperative jamming
Published 2017-02-01“…Secrecy capacity of intrinsically secure communication graph (iS-Graph) can be increased by reducing the signal quality of eavesdroppers with adding controlled interferences.The transmission of secret messages over wireless channels in which the legitimate nodes were aided by cooperative jamming was studied,and a secure communication graph with jamming,jS-Graph was proposed.First,the security properties of jS-Graph was characterized.Then,jamming strategies to confuse eavesdroppers were proposed.To tackle the nearby eavesdropper problem,a two-stage cooperative jamming strategy to jam the eavesdroppers near the source or the destination was applied.The results demonstrate that,with the aid of cooperative jamming the secure communication graph can lead to secrecy gains.These results help to clarify how the presence of eavesdroppers and the cooperative jamming can influence secure connectivity in wireless networks.…”
Get full text
Article -
129
Secure Pesticide Storage: General Features
Published 2009-12-01“…Published by the UF Department of Agronomy, October 2009. PI33/PI068: Secure Pesticide Storage: General Features (ufl.edu) …”
Get full text
Article -
130
-
131
Secure Pesticide Storage: General Features
Published 2009-12-01“…Published by the UF Department of Agronomy, October 2009. PI33/PI068: Secure Pesticide Storage: General Features (ufl.edu) …”
Get full text
Article -
132
Problem Solving and Personality in Security Officers
Published 2021-12-01Subjects: Get full text
Article -
133
Discussion on the cultivation of cyber security talents
Published 2019-06-01Subjects: “…cyber security…”
Get full text
Article -
134
Globalization, Security and Governance Challenges in Nigeria
Published 2024-09-01Subjects: Get full text
Article -
135
Issues and challenges of Internet DNS security
Published 2017-03-01Subjects: “…DNS security…”
Get full text
Article -
136
Economic security specifics in the context of digitalisation
Published 2022-06-01Subjects: Get full text
Article -
137
-
138
-
139
Discussions on the talent cultivation of cyber security
Published 2016-02-01Subjects: “…cyber security…”
Get full text
Article -
140
IMPORT SUBSTITUTION: THE BOARDERS OF THE ENERGY SECURITY
Published 2016-02-01Subjects: Get full text
Article