Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2521
WESTERN BALKANS U. S. POLICY IN THE CONTEXT OF THE PRESIDENT TRUMP’S GRAND STRATEGY
Published 2019-11-01“…Many critics of Donald Trump argue that Donald Trump’s Grand Strategy is an absence of Grand Strategy or that his foreign and security policy is driven by impulses and tactical approach. …”
Get full text
Article -
2522
TERRORISM AND POLITICS IN NIGERIA
Published 2023-12-01“…It concludes by highlighting the imperative for a multidimensional approach to address these complexities and collaboratively work towards a more secure and peaceful Nigeria. …”
Get full text
Article -
2523
Reconceptualizing Corruption as an International Crime: A Review of International Law
Published 2024-10-01“…The discourse surrounding corruption as an international crime is increasingly urgent, as it transcends national borders and contributes to economic crises, conflicts, and various crimes that threaten global security. Scholars such as Christensen (2017), Peters (2018), Davis (2018), and Rothe (2010) have linked corruption to human rights violations, revealing that states often struggle to address it effectively. …”
Get full text
Article -
2524
SQLite Encryption Method for Embedded Databases Based on Chaos Algorithm
Published 2023-01-01“…It is an important topic in the field of information security at present, and it is an effective way to apply to embedded systems. …”
Get full text
Article -
2525
GTrust: Group Extension for Trust Models in Distributed Systems
Published 2014-02-01Get full text
Article -
2526
A Novel Algorithm for Defending Path-Based Denial of Service Attacks in Sensor Networks
Published 2010-12-01“…Existing end-to-end security mechanisms are vulnerable to path-based denial of service attacks (PDoS). …”
Get full text
Article -
2527
Evolutionary Game and Numerical Simulation of Cultivated Land Protection Policies Implementation in China
Published 2021-01-01“…The effective implementation of cultivated land protection policies (CLPP) has important practical significance for improving China’s food security and ecological security. The central government, local governments, and farmers have mutually restricted and influencing interest relations. …”
Get full text
Article -
2528
Rising infrastructure inequalities accompany urbanization and economic development
Published 2025-01-01Get full text
Article -
2529
Analysis and Enhancement of a Password Authentication and Update Scheme Based on Elliptic Curve Cryptography
Published 2014-01-01“…Finally, we compare our enhancement with related works to illustrate that the improvement is more secure and robust, while maintaining low performance cost.…”
Get full text
Article -
2530
Research and Evaluation on Dynamic Response Characteristics of Various Pavement Structures
Published 2022-01-01Get full text
Article -
2531
DIAGNOSTIC EVALUATION OF URBAN METRO TRANSIT SYSTEM POST-COVID-19
Published 2024-09-01“…The survey covers commuter perceptions of safety & security, financial & economic factors, infrastructure & comfort and functional & operational features. …”
Get full text
Article -
2532
Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks
Published 2015-01-01“…The existing solutions are vulnerable to such a type of security attacks, called manipulated compilation attacks (MCAs), since they assume that CHs are uncompromised. …”
Get full text
Article -
2533
Second-degree branch structure blockchain expansion model
Published 2022-03-01“…Finally, a set of malicious attacks is simulated to realize the security constraints of the blockchain, to verify the security of the second-degree branch chain model. …”
Get full text
Article -
2534
DEMOCRACY AND THE FIGHT AGAINST LEADERSHIP CORRUPTION IN SUB-SAHARAN AFRICA: IMPLICATION FOR CONTINENTAL DEVELOPMENT
Published 2024-08-01“… This paper examines democracy and the fight against leadership corruption in relation to Africa and its implication on development and security issues using a qualitative data gathering and analysis method. …”
Get full text
Article -
2535
A Comprehensive Investigation of Fraud Detection Behavior in Federated Learning
Published 2025-01-01“…By addressing these challenges, FL can offer scalable, secure solutions for real-time fraud detection, ensuring the protection of sensitive financial data while enhancing detection accuracy across diverse data sources.…”
Get full text
Article -
2536
From threat to response: Cybersecurity evolution in Albania
Published 2025-01-01“…The focus is on how Albania has tailored its strategic responses to enhance digital resilience and national security. In the second part, the paper provides an in-depth review of the threat models prevalent in the Western Balkans and Albania, highlighting key areas where Albania's cyber management requires further development. …”
Get full text
Article -
2537
GLONASS AS A TOOL TO ENSURE THE SAFETY OF TRANSPORTATION OF DANGEROUS GOODS
Published 2016-05-01“…The article describes the definition of dangerous goods, shows the reasons for the increased control over the transportation of such kind of goods and special security measures, gives the peculiarities of satellite navigation systems, the algorithm of implementation of the global navigation tracking system in practice, and shows a need for further measures to ensure safety transportation of dangerous goods.…”
Get full text
Article -
2538
Historic Abu Ghraib verdict: U.S. Contractor held accountable for torture
Published 2024-01-01“…After years of legal battles, three Iraqi survivors of torture in the Abu Ghraib prison have secured justice in a historic victory in U.S. courts. …”
Get full text
Article -
2539
Recessive transition of rural residential land use from the perspective of value co-creation: A case study of Yiwu City, Zhejiang
Published 2025-01-01“…[Results] (1) Value co-creation of ural residential land follows the process model of “value consensus-value execution-value win-win” and the operational paradigm of “subject interaction - capacity embedding - benefit sharing”, driving the “element integration - structure reorganization - function optimization” of rural residential land use system, resulting in the dynamic evolution of diverse values such as residential security, economic property, production and operation, ecological protection, and cultural inheritance, and achieving the recessive rural residential land use transition. (2) Yiwu’s practice path of guiding multiple stakeholders to interact collaboratively, constructing “value consensus” for rural residential land, driving with multiple forces, and implementing “value execution” for rural residential land through multi-dimensional rule interaction is a successful model for realizing the recessive rural residential land use transformation through value co-creation. (3) Through the practice of value co-creation, Yiwu has achieved a transformation of the functional value of rural residential land from residential security orientation to economic property orientation, and then to a comprehensive and coordinated approach that encompasses residential security, production and operation, economic assets, and ecological protection, etc. …”
Get full text
Article -
2540
Averting War in Northeast Asia: A Proposal
Published 2011-01-01“…The most critical need of countries in Northeast Asia is an institution for crisis prevention, crisis management, and other security-promoting purposes-what might be called a Northeast Asia Security Dialogue Mechanism (NEASDM). …”
Get full text
Article