Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1561
The Blockchain Trilemma: A Formal Proof of the Inherent Trade-Offs Among Decentralization, Security, and Scalability
Published 2024-12-01Subjects: Get full text
Article -
1562
Enhancing Security With Hybrid Active- Passive RIS: A DRL Approach Against Eavesdropping and Jamming
Published 2025-01-01Subjects: Get full text
Article -
1563
Research on the cultivation of cyber security talents under the perspective of double tops based on Jiangsu province
Published 2021-04-01Subjects: Get full text
Article -
1564
Clinical Application of Inferior Alveolar Nerve Block Device for Safe and Secure IANB by Any Operator
Published 2023-01-01“…Nevertheless, it is a useful technique for pain control, and a secure IANB offers significant benefits to operators and patients. …”
Get full text
Article -
1565
Predictors of food security status among informal caregivers of older adults residing in slums in Ghana
Published 2025-02-01Subjects: “…Food security…”
Get full text
Article -
1566
ANATOMY OF CAUSES AND EFFECTS OF THE FARMER-HERDER CONFLICT ON FOOD SECURITY IN BENUE STATE, 2015-2023
Published 2024-05-01Subjects: Get full text
Article -
1567
Effects of vegetable commercialization on household food security: a generalized propensity score matching approach
Published 2024-12-01Subjects: Get full text
Article -
1568
Science and opinion in decision making: A case study of the food security collapse in Sri Lanka
Published 2023-09-01“…Abstract Making decisions related to security, whether at the community, national, or regional level, is a highly intricate task. …”
Get full text
Article -
1569
Cyber–Physical–Social Security of High-DER-Penetrated Smart Grids: Threats, Countermeasures, and Challenges
Published 2025-01-01“…IET Information Security…”
Get full text
Article -
1570
A Review about Internet of Things (IoT) integration with Cloud Computing with a Limelight on Security
Published 2024-01-01Subjects: “…Cloud Computing, IoT, IoT Security, Cyber Security, Cloud Attacks, Cloud Attacks Prevention…”
Get full text
Article -
1571
Enhancing Physical Layer Security in WPCNs With IRS and Controlled Jamming for 6G IoT Applications
Published 2025-01-01Subjects: “…Physical layer security (PLS)…”
Get full text
Article -
1572
UNCHARTED WATERS: ANALYZING PRESIDENT BUHARI'S DIPLOMATIC ADAPTATIONS TO INTERNATIONAL SECURITY THREATS, 2015-2023
Published 2023-12-01Subjects: Get full text
Article -
1573
-
1574
Angle and Context Free Grammar Based Precarious Node Detection and Secure Data Transmission in MANETs
Published 2016-01-01“…However, it produces additional overhead while securing the network. Hence, a Location and Trust-based secure communication scheme (L&TS) is proposed to overcome this limitation. …”
Get full text
Article -
1575
A security data detection and management method in digital library network based on deep learning
Published 2025-01-01Subjects: “…security data…”
Get full text
Article -
1576
Audit Analysis of Abnormal Behavior of Social Security Fund Based on Adaptive Spectral Clustering Algorithm
Published 2021-01-01“…Abnormal behavior detection of social security funds is a method to analyze large-scale data and find abnormal behavior. …”
Get full text
Article -
1577
Security access permission authentication simulation of multi-source network big data based on blockchain
Published 2024-02-01Subjects: Get full text
Article -
1578
CONCEPTUALIZING ENVIRONMENTAL POLICY: AN ANALYSIS OF RUSSIAN AND INTERNATIONAL LEGISLATION IN THE CONTEXT OF ENSURING ENVIRONMENTAL SECURITY IN THE ARCTIC
Published 2024-12-01“…This article presents the results of a study aimed at identifying differences in the environmental security policies embedded in the current legislation of Russia, China, the USA, and the European Union. …”
Article -
1579
Multidimensional evaluation of nutritional security policies in the Republic of Moldova: gaps, progress, and alignment with international standards
Published 2025-01-01Subjects: “…nutritional security…”
Get full text
Article -
1580
Proper selection of personnel for the Security Service of Ukraine as a prerequisite for the career growth of its employees
Published 2023-09-01Subjects: Get full text
Article