Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
261
Indoor Vertical Farming Systems for Food Security and Resource Sustainability
Published 2020-04-01“…Learn about the limitations and challenges of the industry as well as the potential benefits both for food security and resource sustainability. https://edis.ifas.ufl.edu/fr429 …”
Get full text
Article -
262
Efficient and Adaptively Secure Attribute-Based Proxy Reencryption Scheme
Published 2016-05-01“…The scheme proved in this model can only be called selectively secure one. However, from a security perspective, the adaptively secure CP-ABPRE scheme is more desirable. …”
Get full text
Article -
263
FUTURE TRENDS OF FORMATION OF THE INTERNATIONAL REGIME ON THE PROVISION OF INFORMATION SECURITY
Published 2016-08-01Subjects: “…information security…”
Get full text
Article -
264
Monitoring the efficiency of organisation’s internal control and economic security system
Published 2022-03-01Subjects: Get full text
Article -
265
The Future of Water Resources Management, Water Security and Emerging Problems
Published 2024-01-01Subjects: Get full text
Article -
266
A bibliometric analysis of food security and urbanization: insights and implications
Published 2025-01-01Subjects: “…food security…”
Get full text
Article -
267
‘Bottom-up securitization’: A visual turn in security studies
Published 2024-03-01Subjects: “…international security…”
Get full text
Article -
268
A Secure Object Detection Technique for Intelligent Transportation Systems
Published 2024-01-01“…Furthermore, this hybrid algorithm provides robust security against data poisoning-based model replacement and inference attacks throughout the training phase. …”
Get full text
Article -
269
Application of edge computing technology in smart grid data security
Published 2025-02-01“…Absrtact: In order to solve the problem that the two-way flow of power and information between user nodes and service nodes in the smart grid poses a huge threat to the privacy and security of user data, and at the same time, the limitation of the power bureau's computing resources also brings users response delay, service quality degradation and other problems, the author proposes the application of edge computing technology in smart grid data security. …”
Get full text
Article -
270
Energy-Efficient Secure Path Algorithm for Wireless Sensor Networks
Published 2012-04-01“…To prolong the network lifetime, sensor nodes need a secure load-balancing route. In this paper, we investigate the facts of ensuring secure sensed data in a balanced energy network backbone, and propose energy-efficient secure path algorithm (ESPA) for WSNs. …”
Get full text
Article -
271
Blockchain-Based Secure Traceable Scheme for Food Supply Chain
Published 2023-01-01“…The typical food traceability system’s data layer is made up of relational databases managed by core businesses, which cannot ensure data security. It is inefficient and requires a lot of upkeep. …”
Get full text
Article -
272
A neutrosophic framework for evaluating security measures in information systems
Published 2024-11-01Subjects: Get full text
Article -
273
Climate change and agricultural productivity: Economic implications for food security
Published 2024-12-01“…Consequently, it is crucial to assess how the negative effects of climate change can be mitigated to ensure food security. This study evaluated the relationship between agriculture, food security, and CO2 emissions. …”
Get full text
Article -
274
Destabilization of Regional Labour Markets in Ukraineunder Heightened Security Threats
Published 2024-12-01Get full text
Article -
275
Regional and Global dimensions in the complex of problems of security in Southern Caucasus
Published 2011-06-01Get full text
Article -
276
Women’s Role in Violence and UN Women, Peace, and Security Agenda
Published 2024-02-01Subjects: “…the women peace and security agenda…”
Get full text
Article -
277
The Urgency of Job Loss Security Program for the Protection of Human Rights
Published 2024-09-01Subjects: “…job loss security program…”
Get full text
Article -
278
State Participation in Energy Security Provision of the People’s Republic of China
Published 2015-08-01“…The article outlines the contours of energy security of China, the role of major players, including public authorities, government energy corporations, private businesses and the population. …”
Get full text
Article -
279
A statistical approach to the water scarcity implications on food security
Published 2024-11-01“…BACKGROUND AND OBJECTIVES: Jordan faces significant food security challenges due to population growth, climate change, and urbanization, straining limited water resources. …”
Get full text
Article -
280
FSAS: An IoT-Based Security System for Crop Field Storage
Published 2023-01-01“…In this study, we present a remote security management framework for monitoring the crop field storage house, known as the farm security alert system (FSAS). …”
Get full text
Article