Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1801
Multi-Slot Secure Offloading and Resource Management in VEC Networks: A Deep Reinforcement Learning-Based Method
Published 2025-01-01Subjects: Get full text
Article -
1802
Leveraging Local Community Capacities for Sustainable Security: A Case Study of the Border Villages in Darmiyan and Sarbisheh Counties
Published 2024-09-01Subjects: “…sustainable security…”
Get full text
Article -
1803
(In)securitising post-Soviet Space through Security Policies: Russian and the Western Concerns on the Colour Revolutions in Ukraine and Georgia
Published 2023-12-01Subjects: Get full text
Article -
1804
Physical layer security performance analysis of multi-antenna full-duplex relay aided heterogeneous cellular network
Published 2019-05-01Subjects: “…physical layer security…”
Get full text
Article -
1805
Zakat-based urban farming: A tool for poverty alleviation, community empowerment, financial inclusion, and food security
Published 2024-03-01“… Purpose – This study introduces a zakat-based model aimed at poverty reduction and enhancing food security in urban settings. Drawing upon the principles of Islamic social finance, the model integrates urban farming with the utilization of zakat, charity, and corporate social responsibility funds, offering sustainable financial avenues for disadvantaged individuals and social enterprises. …”
Get full text
Article -
1806
Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network
Published 2020-06-01“…To address the above security challenge, we put forth the first continual leakage-resilient identity-based online/offline encryption scheme which is suitable for ensuring secure communications in wireless sensor networks. …”
Get full text
Article -
1807
-
1808
Sybil-Resistant Self-Sovereign Identity Utilizing Attested Execution Secure Processors and Zero-Knowledge Membership Proofs
Published 2025-01-01Subjects: “…Attested execution secure processors…”
Get full text
Article -
1809
Assessment of food provider ecosystem services as food security in modern industrial estate planning at Muaro Jambi Regency
Published 2024-01-01“…This research aims to determine the food carrying capacity and environmental suitability of Kemingking Dalam Village in Muaro Jambi Regency for maintaining food security amidst planned modern industrial developments. …”
Get full text
Article -
1810
Insurgency, Counterinsurgency and Human Security: A Case Study of Armed Violence in Papua during the COVID-19 Pandemic
Published 2022-04-01Subjects: “…human security…”
Get full text
Article -
1811
Empowering Security Operation Center With Artificial Intelligence and Machine Learning—A Systematic Literature Review
Published 2025-01-01Subjects: Get full text
Article -
1812
Ensuring Africa’s Food Security by 2050: The Role of Population Growth, Climate-Resilient Strategies, and Putative Pathways to Resilience
Published 2025-01-01Subjects: “…food security…”
Get full text
Article -
1813
A Novel Security Methodology for Smart Grids: A Case Study of Microcomputer-Based Encryption for PMU Devices
Published 2021-01-01“…In this study, a two-way secure communication methodology underpinned by a chaos-based encryption algorithm for PMU devices is proposed. …”
Get full text
Article -
1814
“An Endless Cycle of Worry and Hardship”: The Impact of COVID-19 on the Food Security of Somali Migrants and Refugees in Nairobi, Kenya
Published 2025-01-01“…Based on the results of a household survey and in-depth interviews with Somali migrants in Nairobi, Kenya in August 2022, this study documents the pandemic-related experience of these migrants in food access and consumption and assesses the overall impacts of COVID-19 on their food security. This study seeks to contribute to the emerging body of case study evidence that assesses the food security outcomes of the pandemic in vulnerable populations. …”
Get full text
Article -
1815
-
1816
Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models
Published 2024-01-01Subjects: Get full text
Article -
1817
Method on Efficient Operation of Multiple Models for Vision-Based In-Flight Risky Behavior Recognition in UAM Safety and Security
Published 2024-01-01“…Recently, with the significant spread of technology in the field of computer vision, research has been conducted to manage passenger safety and security with vision-based approaches. Previous research predominantly focuses on single-task vision models, which limits their ability to comprehensively recognize various situations. …”
Get full text
Article -
1818
-
1819
Changing Diets, Varying Food Consumption Patterns, and Food Security among Recent Zimbabwean Migrants in Windhoek, Namibia
Published 2025-01-01Subjects: “…migration, poverty, food security, dietary changes, food consumption patterns…”
Get full text
Article -
1820
Information Security and Artificial Intelligence–Assisted Diagnosis in an Internet of Medical Thing System (IoMTS)
Published 2024-01-01“…Then, a machine learning - based model was employed to train the encryptor and decryptor for both biosignals and image infosecurity. After secure - data transmission, a case study is conducted for classifying medical images. …”
Get full text
Article