Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2581
Fragilité du géocyberespace à l’heure des conflits cybernétiques
Published 2013-10-01“…Despite the urgency of the problem, effective control of Internet security poses real challenges (political, legal and technical). …”
Get full text
Article -
2582
U.S. strategy in Central Asia
Published 2013-04-01“…In this connection, the author notes that successive governments of the USA, the American political and expert community, business circles traditionally in the last twenty years pay particular attention to this region, bringing to secure the U.S. presence in the region the concept of "Big Central Asia".…”
Get full text
Article -
2583
-
2584
Exploring real estate blockchain adoption: An empirical study based on an integrated task-technology fit and technology acceptance model.
Published 2025-01-01“…The study's findings indicate that attitude, perceived usefulness (PU) and data privacy and security (DPS) exerts highest influence in the proposed theoretical model. …”
Get full text
Article -
2585
Indonesian Defense Diplomacy in Responding to China’s National Interest in South China Sea
Published 2023-03-01“…This study discovered that China’s national interests in the South China Sea center on securing its economic interests and military modernization. …”
Get full text
Article -
2586
FractalNet-based key generation for authentication in Voice over IP using Blockchain
Published 2025-03-01“…However, VoIP systems face critical security challenges, including threats to integrity, authenticity, and confidentiality. …”
Get full text
Article -
2587
NIGERIAN AIRFORCE STRATEGIC DEVELOPMENT AND CAPACITY IN THE FOURTH REPUBLIC, 2019-2023
Published 2024-09-01“…This situation has preoccupied the national security forces, including the Airforce which has carried out several operations to address these threats. …”
Get full text
Article -
2588
A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks
Published 2016-01-01“…With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. …”
Get full text
Article -
2589
Two-Party Quantum Private Comparison Protocol for Direct Secret Comparison
Published 2025-01-01“…A simulation on the IBM Quantum Platform demonstrates the protocol’s feasibility, and a security analysis confirms its robustness against potential eavesdropping and participant attacks. …”
Get full text
Article -
2590
THE UTILITY OF EARLY WARNING SYSTEM AND CRIME PREVENTION: A STUDY OF THE ABDUCTION OF SCHOOL CHILDREN IN NIGERIA
Published 2022-05-01“…This is essential for interrogation, as the abduction of school children has become a threat to national security. The paper used qualitative data from secondary literature and conceptualized theories of early warning signs to provide a theoretical base for its argument. …”
Get full text
Article -
2591
Effectiveness of the Spatial Domain Techniques in Digital Image Steganography
Published 2024-03-01“… Digital steganography is a new and extremely demanding method for transmitting information securely over the internet while employing a covert device. …”
Get full text
Article -
2592
Cyberterrorism: content, forms and promising countermeasures
Published 2023-10-01“…The counteraction system may be based on the following: proper regulation of the concept of cyber terrorism in national legislation, criminalisation of acts of cyber terrorism and its components; enhancing the security and protection of critical information infrastructure; improving existing and applying new counteraction methods; improving cooperation in the field of combating cyber terrorism.…”
Get full text
Article -
2593
YOUTHS PROTEST IN NIGERIA: THE ENDSARS IN PERSPECTIVE
Published 2022-05-01“…However, where neglected, unskilled and lacked the requisite social security in the event of poor governance, low education, poor investment environment and other essential qualities of lives, youths becomeliability, threat and object of national instability to their country. …”
Get full text
Article -
2594
Impact of Occlusion Masks on Gender Classification from Iris Texture
Published 2024-01-01Get full text
Article -
2595
Functions and Authorities of the Armed Forces of Ukraine on the Crime Scene
Published 2019-12-01“…It is emphasized that in order to ensure the implementation of the said functions of the Armed Forces of Ukraine, they have the right to take measures to restore the territorial integrity of Ukraine, as well as to provide comprehensive development of secure, economic, information, telecommunication, social and humanitarian infrastructure on the territories adjacent to the temporarily occupied territories in Donetsk and Luhansk to implement, in accordance with strategic defense planning documents, measures to strengthen defense and security capabilities of the country. …”
Get full text
Article -
2596
Toward sustainable desalination: a patent analysis of technology-development trajectories
Published 2025-01-01“…Research and development (R&D) in desalination has enabled innovations and expanded global water-supply capacity to enhance water security. Despite increased desalination capacity, significant sustainability concerns persist. …”
Get full text
Article -
2597
TAX CONTROL OF EXPORT OPERATIONS: PROBLEMS, PROSPECTS, SOLUTIONS
Published 2024-12-01“…The implementation of these measures will contribute to improving economic security and the efficiency of the tax system.…”
Get full text
Article -
2598
An Orderly EV Charging Scheduling Method Based on Deep Learning in Cloud-Edge Collaborative Environment
Published 2021-01-01Get full text
Article -
2599
Weighted Sum Secrecy Rate Optimization for Cooperative Double-IRS-Assisted Multiuser Network
Published 2024-01-01“…In this paper, we present a double-intelligent reflecting surfaces (IRS)-assisted multiuser secure system where the inter-IRS channel is considered. …”
Get full text
Article -
2600