Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
161
Digital Social Security: Potential for Platform Work
Published 2020-04-01“…Abstract Social security in platform work has serious gaps. ‘Digital Social Security’ shows how social insurance can also be organised in a market with a very short-term and (partially) internationally integrated character. …”
Get full text
Article -
162
Mechanism development for managing the economic security of the enterprise
Published 2024-02-01Subjects: “…economic security…”
Get full text
Article -
163
CONTEMPORARY ENERGY SECURITY STUDIES: THEORETICAL ASPECTS
Published 2013-08-01Subjects: “…еnergy security…”
Get full text
Article -
164
-
165
ECONOMIC SECURITY OF THE TECHNICAL UNIVERSITY: SYSTEM OF INDICATORS
Published 2016-12-01Subjects: “…projections of economic security…”
Get full text
Article -
166
Blockchain-based secure and fair crowdsourcing scheme
Published 2019-07-01“…First, we define the basic requirements of blockchain-based crowdsourcing schemes including fairness, confidentiality, and integrity. And then, using secure hash, commitment, and homomorphic encryption, we propose a blockchain-based secure and fair crowdsourcing scheme, that is, BFC. …”
Get full text
Article -
167
Secure channel estimation model for cognitive radio network physical layer security using two-level shared key authentication
Published 2025-01-01Subjects: Get full text
Article -
168
A Study on Zone-Based Secure Multicast Protocol Technique to Improve Security Performance and Stability in Mobile Ad-Hoc Network
Published 2025-01-01Subjects: Get full text
Article -
169
Parents' Postnatal Sense of Security: A Concept Analysis
Published 2024-12-01Subjects: Get full text
Article -
170
Community Food Security and Florida Cooperative Extension Service
Published 2007-07-01“…Swisher, defines community food security and identifies its importance for extension agents in Florida. …”
Get full text
Article -
171
Method Framework for Developing Enterprise Architecture Security Principles
Published 2019-10-01Subjects: Get full text
Article -
172
«Human Security»: Concept, Political Discourse, and Ways of Implimintation
Published 2010-12-01“…На фоне существования множес- тва трактовок human security наиболее адекватно её смысл передаёт термин безопасность личности. …”
Get full text
Article -
173
Secure Localization in Wireless Sensor Networks with Mobile Beacons
Published 2012-10-01“…We present a scheme, called SLMB, for secure sensor localization in WSNs in which we propose to use a mobile beacon node with the goal of reducing the overall energy consumption in sensor nodes during sensor localization. …”
Get full text
Article -
174
THE PERSPECTIVES OF INTERNATIONAL REGULATION OF PRIVATE MILITARY AND SECURITY COMPANIES’
Published 2016-04-01Subjects: “…private military and security companies…”
Get full text
Article -
175
Improving the information security sustainability of the economy financial sector
Published 2023-06-01“…The study analyzes the main activities of Russia Bank, aimed at ensuring the sustainability of information security in the financial sector of the economy, as well as ongoing activities aimed at limiting the spread of cybercrime based on an automated incident handling system. …”
Get full text
Article -
176
Systematic literature review on Internet-of-Vehicles communication security
Published 2018-12-01“…As a result, there is an urgent need to study the possible security threats and different solutions that can ensure the safety of drivers and also the security of industry. …”
Get full text
Article -
177
Automatic Generation of Simulators for Processors Enhanced for Security in Virtualization
Published 2025-01-01Subjects: Get full text
Article -
178
-
179
Violation of human rights as the basis for the threats to international security
Published 2021-12-01Subjects: Get full text
Article -
180
FOOD SECURITY IN SOUTH ASIA: MAJOR CHALLENGES AND SOLUTIONS
Published 2018-05-01Subjects: Get full text
Article