Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1421
Approach for information systems security situation evaluation using improved FAHP and Bayesian network
Published 2009-01-01“…An approach for the information systems security situation assessment based on an improved FAHP and Bayesian network was proposed to solve the problem of obtaining the risk grade.The improved FAHP was used to quantify the factor of attack severity which was hard to scale.Simultaneously, the conditional probability matrices for all fac-tors were defined with the expert knowledge.Then a model for information security situation assessment was established by the Bayesian network inference, and the corresponding approach was presented.Finally, an illustrative instance was given to demonstrate its rationality and feasibility.Thus it may provide a new way for assessing information systems security situation.…”
Get full text
Article -
1422
A hybrid blockchain-based solution for secure sharing of electronic medical record data
Published 2025-01-01“…Patient privacy data security is a pivotal area of research within the burgeoning field of smart healthcare. …”
Get full text
Article -
1423
The Role of International Arbitration in Maintaining World Peace and Security with an Emphasis on Non- State Actors
Published 2024-03-01Subjects: “…world peace and security…”
Get full text
Article -
1424
Provably secure biometric and PUF-based authentication for roaming service in global mobility network
Published 2025-02-01“…However, while GLOMONET offers numerous benefits, it also present security challenges that need to be addressed. To ensure secure mutual authentication and prevent attacks such as impersonation, physical attacks, and DoS attacks, GLOMONET must provide strong anonymity, address loss of synchronization issues, and incorporate unclonable devices as an essential security feature. …”
Get full text
Article -
1425
Britain’s Indo-Pacific Security and Trade Policies: Continuity and Change Under the Labour Government
Published 2024-12-01“…The United Kingdom’s main motivation for its engagement in the Indo-Pacific is commercial, alongside its contributions to regional security. In July 2024, a Labour government replaced the Conservative government. …”
Get full text
Article -
1426
ASSESSMENT OF SECURITY OPERATIONS ON TACKLING BANDITRY FOR SUSTAINABLE NATIONAL DEVELOPMENT IN NORTH-WESTERN NIGERIA
Published 2024-01-01Subjects: Get full text
Article -
1427
A Hybrid and Secure Priority-Guaranteed MAC Protocol for Wireless Body Area Network
Published 2014-02-01“…In addition, a set of security keys is used to prevent illegal access to the network. …”
Get full text
Article -
1428
Breaking the Blockchain Trilemma: A Comprehensive Consensus Mechanism for Ensuring Security, Scalability, and Decentralization
Published 2024-01-01“…The ongoing challenge in the world of blockchain technology is finding a solution to the trilemma that involves balancing decentralization, security, and scalability. This paper introduces a pioneering blockchain architecture designed to transcend this trilemma, uniting advanced cryptographic methods, inventive security protocols, and dynamic decentralization mechanisms. …”
Get full text
Article -
1429
2D Sin-Cos-Henon Map for Color Image Encryption with High Security
Published 2022-01-01“…In this paper, a high security color image encryption algorithm is proposed by 2D Sin-Cos-Hénon (2D-SCH) system. …”
Get full text
Article -
1430
Homeland security video surveillance system utilising the internet of video things for smart cities
Published 2021-07-01Subjects: Get full text
Article -
1431
Explanation of Security Sequences of Climate Change (Case Study: Iran’s Central Drainage Basin)
Published 2017-09-01Subjects: Get full text
Article -
1432
Data sharing scheme supporting secure outsourced computation in wireless body area network
Published 2017-04-01Subjects: Get full text
Article -
1433
Design of precoding matrices in MIMO full duplex two-way security communication system
Published 2020-10-01Subjects: “…physical layer security…”
Get full text
Article -
1434
Problems, principles and prospects of international legal regulation of activities of private military and security companies
Published 2010-06-01Subjects: “…проект конвенции о чвоп. keywords: private military and security companies…”
Get full text
Article -
1435
Improving Oil Supply Security: Using a Risk Optimization Model to China and India
Published 2021-01-01“…Africa and North America will play a more important role in India’s oil supply security.…”
Get full text
Article -
1436
BORDER SECURITY AND TRANSNATIONAL THREATS: A COMPARATIVE ANALYSIS OF NIGERIA-NIGER BORDER DYNAMICS
Published 2023-12-01Subjects: Get full text
Article -
1437
Research status and development trends of security assurance for space-ground integration information network
Published 2016-11-01Subjects: Get full text
Article -
1438
Design for secure two-party computation protocol based on ElGamal variant’s homomorphic
Published 2015-02-01Subjects: “…secure two-party computation…”
Get full text
Article -
1439
-
1440
ESTIMATION OF ENERGY SECURITY OF AZERBAIJAN REPUBLIC WITH DUE ACCOUNT OF TENDENCY INFLUENCE ON INDICATORS’ CHANGES
Published 2014-02-01Subjects: “…energy security…”
Get full text
Article