Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1821
Criminological examination of law acts and their drafts in the system of measures to combat corruption crime in the security and defense sector of Ukraine
Published 2024-12-01“…The article is devoted to the study of the essence, purpose of criminological examination of regulatory legal acts and their drafts as a tool for combating corruption crime in the security and defense sector of Ukraine. A narrow and broad understanding of the specified examination is proposed. …”
Get full text
Article -
1822
Secured DICOM medical image transition with optimized chaos method for encryption and customized deep learning model for watermarking
Published 2025-04-01“…For healthcare professionals to view patient medical images, a secure online transmitting technique is essential. …”
Get full text
Article -
1823
FEATURES OF THE MODEL OF A SPECIALIZED GEOSPATIAL DATABASE FOR VISUALIZING INDICATORS OF HUMAN SOCIO-ECONOMIC SECURITY IN WARTIME CONDITIONS
Published 2025-01-01Subjects: “…social-economic security…”
Get full text
Article -
1824
Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2X
Published 2023-08-01“…Aiming at the efficiency issue of handover authentication for a large number of vehicles in the 5G-V2X scenario, a secure and efficient group handover authentication protocol based on trajectory prediction was proposed.Firstly, the effect of completing key agreement protocol in advance was achieved by predicting vehicle trajectories.Secondly, vehicles with mobility relevance were treated as the same group through user grouping algorithms, and then all vehicles within the group were batch verified using certificateless aggregation signature technology.In addition, to address the vulnerability of aggregated signature technology to DoS attacks, a binary search method was used to quickly locate malicious users and improve the efficiency of group handover authentication protocol.Finally, the security analysis of the protocol was conducted using the formal verification tool Scyther, and compared with the existing optimal protocol, the computational efficiency is improved by 30%.…”
Get full text
Article -
1825
Physical layer security of full-duplex relay-assisted D2D networks under outdated CSI
Published 2023-03-01Subjects: Get full text
Article -
1826
-
1827
An evaluation method for power supply guarantee capability of multi-city interconnected power system based on security region
Published 2025-01-01Subjects: “…security region…”
Get full text
Article -
1828
Exploring South Africa’s Foreign Policy Objectives in the Decolonisation of the Intergovernmental Organisations: The Case of the United Nations Security Council
Published 2024-10-01“…The United Nations (UN), which is the largest intergovernmental organization (INGO), has a structure mainly focused on global security which is the United Nations Security Council (UNSC). …”
Get full text
Article -
1829
Blockchain-Powered Secure and Scalable Threat Intelligence System With Graph Convolutional Autoencoder and Reinforcement Learning Feedback Loop
Published 2025-01-01“…This paper proposes an approach that integrates secure blockchain technology with data preprocessing, deep learning, and reinforcement learning to enhance threat detection and response capabilities. …”
Get full text
Article -
1830
Analyzes of the effects and security function social capital in sustainable rural border areas the villages of the central city of Saravan
Published 2016-06-01Subjects: Get full text
Article -
1831
Crayfish optimization based pixel selection using block scrambling based encryption for secure cloud computing environment
Published 2025-01-01“…However, ensuring a high level of security in CC environments remains a significant challenge. …”
Get full text
Article -
1832
-
1833
Wireless sensor security communication and anti-leak locating technology based on region partition in power mobile inspection
Published 2016-02-01“…In order to solve the problem of low transmission efficiency and security of the grid,ensure the normal operation of power network,reduce network burden and improve the security of system access,a secure communication and private key location technology of wireless sensor based on region partition was designed by using the technology of time synchronization verification. …”
Get full text
Article -
1834
The Effect of Alcoholism on Food Security in Rural Areas: A Case Study of Bufundi Subcounty Rubanda District Uganda.
Published 2024Subjects: Get full text
Thesis -
1835
Research on data encryption system and technology for cloud storage
Published 2020-08-01Subjects: “…cloud security…”
Get full text
Article -
1836
-
1837
Real-Time PPG-Based Biometric Identification: Advancing Security with 2D Gram Matrices and Deep Learning Models
Published 2024-12-01Subjects: Get full text
Article -
1838
Intelligent classification of computer vulnerabilities and network security management system: Combining memristor neural network and improved TCNN model.
Published 2025-01-01“…To enhance the intelligent classification of computer vulnerabilities and improve the efficiency and accuracy of network security management, this study delves into the application of a comprehensive classification system that integrates the Memristor Neural Network (MNN) and an improved Temporal Convolutional Neural Network (TCNN) in network security management. …”
Get full text
Article -
1839
-
1840
Determinants of readiness to implement forensic patient-oriented research: a study of barriers and facilitators in a high-secure hospital
Published 2025-01-01Subjects: Get full text
Article