Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1601
Network Architecture, Security Issues, and Hardware Implementation of a Home Area Network for Smart Grid
Published 2012-01-01“…This paper discusses aims, architecture, and security issues of Smart Grid, taking care of the lesson learned at University of Pisa in research projects on smart energy and grid. …”
Get full text
Article -
1602
Dynamics of the Indonesian Parliament in Formulating Food Laws to Achieve Food Security at the End of the New Order
Published 2024-07-01Subjects: Get full text
Article -
1603
INFLUENCE OF SECURITY CHALLENGES ON STUDENT ACADEMIC PERFORMANCE IN COLLEGE OF EDUCATION BILLIRI, GOMBE STATE, NIGERIA
Published 2024-06-01“…The major recommendations by the researchers are the management of the college are to invest in advanced and reliable security equipment, ensure the presence of adequately trained security personnel and implement comprehensive and effective security policies and procedures and establish counseling and psychological support services to help students manage stress and anxiety related to insecurity. …”
Get full text
Article -
1604
Security analysis of public-key cryptosystems based on matrix action problem against quantum attack
Published 2023-03-01Get full text
Article -
1605
Determinants of Rural Household Food Security Status in North Shewa Zone, Amhara Region, Ethiopia
Published 2022-01-01“…This paper used the calorie intake method per day to measure household food security status and a logit model to investigate the determinants of food security. …”
Get full text
Article -
1606
A flexible continuous-wave quantum cryptography scheme with zero-trust security for Internet of Things
Published 2022-11-01“…As quantum computing techniques develop rapidly, the security of classical communication, which is usually based on public key encryption algorithm, is under great threat. …”
Get full text
Article -
1607
The association between household’s asset ownership and food security: panel data evidence from Bangladesh
Published 2025-01-01Subjects: Get full text
Article -
1608
Task security scheduling method for 5G+MEC based grid edge computing platform
Published 2022-12-01Subjects: Get full text
Article -
1609
A Survey on Reconfigurable Intelligent Surface for Physical Layer Security of Next-Generation Wireless Communications
Published 2024-01-01Subjects: Get full text
Article -
1610
-
1611
U.S. trade in the sphere of strategic products and services as the first level of analysis of its economic security
Published 2024-01-01Subjects: Get full text
Article -
1612
Climate change reflects on security of the border villages, case study: Salas Babajani border villages
Published 2020-06-01Subjects: “…security…”
Get full text
Article -
1613
Application of fuzzy comprehensive evaluation method in network information security assessment of electric power enterprises
Published 2020-03-01Subjects: Get full text
Article -
1614
Research on new energy station network security assessment method based on improved LSTM network
Published 2024-10-01Subjects: Get full text
Article -
1615
Security Enhancement Using Cache Based Reauthentication in WiMAX Based E-Learning System
Published 2015-01-01Get full text
Article -
1616
Retracted: Risk Prediction Algorithm of Social Security Fund Operation Based on RBF Neural Network
Published 2024-01-01Get full text
Article -
1617
Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
Published 2014-01-01“…Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. …”
Get full text
Article -
1618
Information Security Management in Small Public Sector Organizations: Requirements and Design of a Procedural Approach
Published 2023-12-01Subjects: Get full text
Article -
1619
Study on Ecological Security Assessment of Dongjiang River Basin in Jiangxi Province Based on PSFR Model
Published 2021-01-01Subjects: Get full text
Article -
1620
A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review
Published 2024-01-01Subjects: Get full text
Article