Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1461
Research and practice on data center security architecture refactoring based on intelligent service chain
Published 2024-11-01Subjects: Get full text
Article -
1462
A Secure Image Steganography Using Shark Smell Optimization and Edge Detection Technique
Published 2022-10-01Subjects: Get full text
Article -
1463
Strategic Health Diplomacy: An Indonesia’s Approach in Securing COVID-19 Booster Vaccine Supplies
Published 2024-06-01“…This study provides an in-depth analysis of Indonesia’s health diplomacy strategy in securing booster vaccines for COVID-19, a critical component in mitigating the impact of the pandemic. …”
Get full text
Article -
1464
ECONOMIC SECURITY DOMINANTS OF THE RUSSIAN INDUSTRIAL ORGANIZATIONS WITH PARTICIPATION OF STATE IN CAPITAL: CHRONICLES OF AVTOVAZ
Published 2018-09-01Subjects: Get full text
Article -
1465
LiteST: a lightweight secure time synchronization protocol for wireless sensor networks
Published 2009-01-01Subjects: Get full text
Article -
1466
Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology
Published 2022-01-01“…In order to detect the computer network security technology vulnerabilities due to various factors, the normal operation of the computer network must be ensured, the user’s confidential information must be protected, and it is proposed that the analysis and research on security vulnerability detection must be strengthened. …”
Get full text
Article -
1467
THE ROLE OF ENGINEERING PEDAGOGY IN THE SOLUTION OF SECURITY PROBLEMS ON AUTOMOBILE TRANSPORT AND IN THE SPHERE OF ROAD MAINTENANCE
Published 2022-05-01Subjects: Get full text
Article -
1468
A Secure Learned Image Codec for Authenticity Verification via Self-Destructive Compression
Published 2025-01-01Subjects: “…secure learned image codec…”
Get full text
Article -
1469
Ransomware on cyber-physical systems: Taxonomies, case studies, security gaps, and open challenges
Published 2024-01-01Subjects: Get full text
Article -
1470
Risk management in the sphere of state economic security provision using professional liability insurance
Published 2019-08-01Subjects: Get full text
Article -
1471
Role-based abstract modeling of blockchain auction contracts and verification of temporal security and fairness
Published 2024-10-01Subjects: Get full text
Article -
1472
Exploring the Integration of Blockchain and Distributed DevOps for Secure, Transparent, and Traceable Software Development
Published 2025-01-01“…However, it does suffer from a lack of security, transparency, and traceability, which can result in project delays, a lack of trust between stakeholders, and even project failure. …”
Get full text
Article -
1473
Exploration of teaching method incorporating ideological elements for the cutting-edge technology of cyberspace security
Published 2019-06-01Subjects: “…cyberspace security…”
Get full text
Article -
1474
Influence of Internet plus on cyberspace security and the technology development trend in Internet plus era
Published 2017-05-01Subjects: Get full text
Article -
1475
Retracted: A Microgrid Security Defense Method Based on Cooperation in an Edge-Computing Environment
Published 2023-01-01Get full text
Article -
1476
Analyzing Rail Traffic Diversion Based on Machine Learning Technique considering Transportation Security
Published 2022-01-01“…Based on a stated preference survey, we comprehensively analyze the travel psychology of residents and the advantages and disadvantages of rail transit and conventional buses, travel time, travel cost, travel security, and vehicle comfort and investigate the relationship between the relevant influencing factors and the transition probability from rail transit to buses. …”
Get full text
Article -
1477
Study of Water Resources Security Guarantee Mechanism in Economic Zone in North Bay in Guangxi
Published 2010-01-01Get full text
Article -
1478
Implementation of lightweight intrusion detection model for security of smart green house and vertical farm
Published 2018-04-01“…Development and implementation of smart green houses and vertical farms are two major solutions for the expected crisis, but as other ICT-based systems, their security problems must be dealt with. Nevertheless, current network forensics is still unable to fully monitor and analyze computer network traffic to gather the evidences of malicious attacks or intrusions. …”
Get full text
Article -
1479
Competence and Authorization of the Security Service Of Ukraine as a Subject to Anti-Corruption and Organized Crime
Published 2020-06-01Subjects: Get full text
Article -
1480
Charging wireless sensor network security technology based on encryption algorithms and dynamic model
Published 2020-02-01“…Wireless networks cover all aspects of life, along with it, network security issues have gradually emerged. In recent years, network security vulnerabilities have been exposed continuously, from WiFi to Bluetooth, people gradually realize the security of wireless networks. …”
Get full text
Article