Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1741
Climate change–Drylands–Food Security Nexus in Africa: From the Perspective of Technical Advances, Challenges, and Opportunities.
Published 2024“…Climate change impacts on drylands pose more vexing risks to socio-ecological systems, resulting in food security issues, biodiversity loss, and livelihood shifts in Africa. …”
Get full text
Article -
1742
Formation and development of special police units: a retrospective analysis
Published 2024-03-01Subjects: Get full text
Article -
1743
OSMANLI DÖNEMİNDEN GÜNÜMÜZE SERMAYE PİYASALARI ÖZELİNDE ARACILIK FAALİYETLERİNİN TARİHSEL GELİŞİMLERİ ÜZERİNE DÜŞÜNCELER
Published 2025-01-01Subjects: Get full text
Article -
1744
Asymmetric proxy re-encryption system achievable for office user to securely sharing outsourcing data of mobile terminal
Published 2016-09-01Subjects: Get full text
Article -
1745
A semi-synchronous federated learning framework with chaos-based encryption for enhanced security in medical image sharing
Published 2025-03-01“…Protecting sensitive health information and promoting clinical research depend on medical data security. This paper suggests an innovative framework that integrates healthcare engineering, chaotic encryption, and artificial intelligence (AI) to address the privacy issue of medical data. …”
Get full text
Article -
1746
Creating a model of threats to Ukraine’s national critical infrastructure as a basis for ensuring its security and resilience
Published 2024-03-01Subjects: Get full text
Article -
1747
Secure two-party line segments intersection scheme and its application in privacy-preserving convex hull intersection
Published 2013-01-01Subjects: Get full text
Article -
1748
SAFE-CAST: secure AI-federated enumeration for clustering-based automated surveillance and trust in machine-to-machine communication
Published 2025-01-01Subjects: Get full text
Article -
1749
Systematic Review of Usability Factors, Models, and Frameworks with Blockchain Integration for Secure Mobile Health (mHealth) Applications
Published 2024-12-01“…Blockchain integration emerged as a promising approach to improve data security, interoperability, and user trust, particularly for older adults who engage with complex, multimodal health data. …”
Get full text
Article -
1750
Resilience and strategic management: ways to ensure economic and social security of Ukrainian enterprises during long-term warfare
Published 2024-12-01Subjects: “…Social security…”
Get full text
Article -
1751
Application research of distribution network based on quantum secure communication and 5G hard-slicing private network
Published 2022-01-01Subjects: Get full text
Article -
1752
Deep reinforcement learning based algorithm for real-time QoS optimization of software-defined security middle platform
Published 2023-05-01Subjects: “…software defined security…”
Get full text
Article -
1753
Systems resource allocation algorithm for RIS-assisted D2D secure communication based on parallel CNN
Published 2022-03-01“…To meet the requirements of intelligent signal processing and physical layer security, aiming at the shortage of spectrum resources, a resource allocation algorithm for reconfigurable intelligent surface (RIS)-assisted the device to device (D2D) communication was proposed.D2D users communicated by multiplexing the spectrum resources of cellular users.Considering the constraints of D2D transmission rate, base station transmission power and RIS transmission phase shift, the problem of maximizing user security rate was formulated.To solve the nonlinear programming problem, a parallel convolutional neural network (CNN) algorithm was proposed to obtain the optimal resource allocation scheme.Simulation results show that the parallel CNN algorithm can effectively improve the secrecy rate and it is significantly better than other benchmark algorithms.…”
Get full text
Article -
1754
Harnessing the potential of shared data in a secure, inclusive, and resilient manner via multi-key homomorphic encryption
Published 2024-06-01“…Using the AI4I public predictive maintenance dataset, we demonstrate the MK-HELR algorithm, setting the stage for further research in secure, dynamic, and collaborative multi-party learning scenarios.…”
Get full text
Article -
1755
Si Substrate Backside—An Emerging Physical Attack Surface for Secure ICs in Flip Chip Packaging
Published 2024-01-01Subjects: Get full text
Article -
1756
Optimal Information Hiding: Advanced Bitstream-Based Watermarking for Secure and Efficient Integration of Image Data in Digital Videos
Published 2024-01-01“…The outcomes underscore its practical viability for copyright protection, contributing to a more secure digital media landscape.…”
Get full text
Article -
1757
Security-reliability tradeoff scheme for cognitive relay networks with eavesdropping attack over Nakagami-m fading channels
Published 2018-12-01Subjects: Get full text
Article -
1758
EMPOWERMENT STRATEGY THROUGH THE ROLE OF THE TERRITORIAL TASK FORCE IN HANDLING SOCIAL AND SECURITY CONFLICT IN PUNCAK JAYA DISTRICT
Published 2024-12-01“…This research aims to analyze the strategy for empowering the Papua defense region through the role of the Territorial Task Force in handling social and security conflicts in Puncak Jaya Regency. This research uses Strategy theory according to Thomas Schelling, namely management instruments for survival and winning competition. …”
Get full text
Article -
1759
EFFECT OF TRAINING ON CAREER PERFORMANCE OF NIGERIA SECURITY AND CIVIL DEFENSE CORPS (NSCDC) PERSONNEL IN KADUNA STATE COMMAND
Published 2022-12-01“…It recommended among others that the NSCDC as a security organization should organize training on regular basis to improve the career performance of personnel of their organization in view of the current security challenges facing the country. …”
Get full text
Article -
1760
Evaluation method for information security capability of mobile phone user based on behavior ontology under unconscious condition
Published 2016-10-01Subjects: “…security behavior ontology…”
Get full text
Article