Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1701
IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions
Published 2022-07-01“…IET Information Security…”
Get full text
Article -
1702
An Improved Clustering Method for Detection System of Public Security Events Based on Genetic Algorithm and Semisupervised Learning
Published 2017-01-01“…In this paper, a detecting system for public security events is designed, which carries out clustering operation to cluster relevant text data, in order to benefit relevant departments by evaluation and handling. …”
Get full text
Article -
1703
Public-private partnerships in National Security. A case study in the context of the war in Ukraine: 2022-2024
Published 2024-12-01Subjects: Get full text
Article -
1704
WOMEN ORGANIZATIONS, SECURITY AND PEACE-BUILDING IN NIGERIA: AN EXAMINATION OF THE PROGRAMMES AND ACTIVITIES OF EUNICE SPRING OF LIFE FOUNDATION
Published 2023-12-01Subjects: Get full text
Article -
1705
Advancing Passwordless Authentication: A Systematic Review of Methods, Challenges, and Future Directions for Secure User Identity
Published 2025-01-01Subjects: Get full text
Article -
1706
Sql injection detection using Naïve Bayes classifier: A probabilistic approach for web application security
Published 2025-01-01“…A pervasive security issue in web applications is database injection, enabling attackers to alter SQL queries in order to get unauthorized access to confidential information. …”
Get full text
Article -
1707
Explainable artificial intelligence in web phishing classification on secure IoT with cloud-based cyber-physical systems
Published 2025-01-01“…This article develops an Explainable Artificial Intelligence with Aquila Optimization Algorithm in Web Phishing Classification (XAIAOA-WPC) approach on secure Cyber-Physical Systems. The developed XAIAOA-WPC approach mainly emphasizes the effectual classification and recognition of web phishing based on CPS. …”
Get full text
Article -
1708
MP2P high capacity and security resource node selection strategy based on Bayesian game
Published 2016-01-01Subjects: Get full text
Article -
1709
Research on Food Security Risk Assessment and Early Warning in China Based on BP Neural Network Model
Published 2022-01-01“…According to the influencing factors in food security, this paper uses the PCA method and the AHP method to construct a food security early warning index system that includes 4 secondary indicators and 13 tertiary indicators of total security, trade security, ecological security, and food security. …”
Get full text
Article -
1710
A Novel Secure Routing Protocol——Multi-Next Hop Routing Protocl Based on Node Potential
Published 2014-07-01Subjects: “…secure routing…”
Get full text
Article -
1711
-
1712
Designing the behavioral model of stakeholders in the corporate governance of iran's social security organization and its affiliated companies
Published 2024-08-01Subjects: Get full text
Article -
1713
LEADERSHIP STYLE AND NATIONAL SECURITY IN NIGERIA: AN ASSESSMENT OF EBELE GOOD LUCK JONATHAN AND MUHAMMADU BUHARI’S ADMINISTRATIONS
Published 2023-12-01Subjects: Get full text
Article -
1714
Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing
Published 2024-01-01Get full text
Article -
1715
Spatial distribution and influencing factors of China’s overseas farmland investment projects under the background of food security
Published 2025-01-01Subjects: Get full text
Article -
1716
How Earth System Models Can Inform Key Dimensions of Marine Food Security in the Alaskan Arctic
Published 2024-12-01Subjects: “…food security…”
Get full text
Article -
1717
Integrated Evaluation of the Ecological Security Pattern in Central Beijing Using InVEST, MSPA, and Multifactor Indices
Published 2025-01-01Subjects: “…ecological security patterns…”
Get full text
Article -
1718
Transfer Learning-Empowered Physical Layer Security in Aerial Reconfigurable Intelligent Surfaces-Based Mobile Networks
Published 2025-01-01Subjects: “…Physical layer security…”
Get full text
Article -
1719
Information technology industry state support as a key problem of ensuring the national security of the Russian Federation
Published 2022-10-01Subjects: Get full text
Article -
1720
Impact of Pearl River Key Reservoir Group Water Allocation on Power Generation and Power Grid Security
Published 2007-01-01Get full text
Article