Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1721
Law Enforcement Activity of the National Guard of Ukraine on Ensuring Public Security and Order: Problems and Ways of Their Solution
Published 2019-06-01Subjects: “…public security…”
Get full text
Article -
1722
Erasure channel modelling–based secure bit allocation schemes for multipath routing in wireless sensor networks
Published 2016-12-01“…In this article, we study secure multipath routing with energy efficiency for a wireless sensor network in the presence of eavesdroppers. …”
Get full text
Article -
1723
Defense Stability and Ecosystem Sustainability in the Strait of Malacca: Maritime Security Challenges from an International Relations Perspective
Published 2025-01-01“…The use of advanced technologies such as satellite monitoring has enhanced maritime security, yet stronger environmental protection policies are still needed. …”
Get full text
Article -
1724
Key technologies and implementation methods of endogenous safety and security cloud data center based on mimic architecture
Published 2021-03-01Subjects: “…endogenous safety and security…”
Get full text
Article -
1725
Enhancing the robustness of block ciphers through a graphical S-box evolution scheme for secure multimedia applications
Published 2024-12-01“…Block ciphers are essential for the secure exchange of data and communication, as they are one of the primary components of network security systems. …”
Get full text
Article -
1726
Intelligent deep federated learning model for enhancing security in internet of things enabled edge computing environment
Published 2025-02-01“…Therefore, this paper develops an Intelligent Deep Federated Learning Model for Enhancing Security (IDFLM-ES) approach in the IoT-enabled edge-computing environment. …”
Get full text
Article -
1727
Exploring Nexus between food security and the loss of agro-biodiversity: a study in Madhya Nepal, Lamjung
Published 2025-01-01“…Abstract Nepal has made significant strides in enhancing food security, achieving a moderate hunger index of 15.0 in 2023. …”
Get full text
Article -
1728
Improving farm households’ economic status to address food security in Ghana: The role of participation in nonfarm activities
Published 2025-02-01Subjects: “…Security…”
Get full text
Article -
1729
-
1730
A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications
Published 2025-01-01Subjects: Get full text
Article -
1731
-
1732
Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing.
Published 2024-01-01“…Our research aims to prioritise security variables using quantum security criteria, providing an innovative viewpoint on software security evaluation in the quantum computing era.…”
Get full text
Article -
1733
Antenna selection algorithm based on cut-off rate for secure spatial modulation with finite alphabet input
Published 2020-03-01Subjects: “…secure spatial modulation…”
Get full text
Article -
1734
Resource optimization of secure energy efficiency based on mmWave massive MIMO-NOMA system with SWIPT
Published 2020-08-01Subjects: Get full text
Article -
1735
-
1736
Research on Wireless Sensor Network Security Location Based on Received Signal Strength Indicator Sybil Attack
Published 2020-01-01“…This paper studies the security location mechanism of the sensor network node under the attack of Sybil and analyzes the safe attacks which are possibly accepted and safe requirement in the location system. …”
Get full text
Article -
1737
IPTV Service Framework Based on Secure Authentication and Lightweight Content Encryption for Screen-Migration in Cloud Computing
Published 2015-01-01“…A secure authentication for user devices and multimedia protection mechanism is necessary to protect both user devices and IPTV services. …”
Get full text
Article -
1738
Using RES Surpluses to Remove Overburden from Lignite Mines Can Improve the Nation’s Energy Security
Published 2024-12-01Subjects: Get full text
Article -
1739
Climate change–drylands–food security nexus in Africa: From the perspective of technical advances, challenges, and opportunities
Published 2023“…Climate change impacts on drylands pose more vexing risks to socio-ecological systems, resulting in food security issues, biodiversity loss, and livelihood shifts in Africa. …”
Get full text
Article -
1740
Farmers’ Perception of the Impacts of Climate Variability and Change on Food Security in Rubanda District, South Western Uganda
Published 2019Subjects: “…Climate Variability and Change; Food security; Rubanda district; Agricultural production; Farmers’ perception…”
Get full text
Article