Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
281
FWA-SVM Network Intrusion Identification Technology for Network Security
Published 2025-01-01Subjects: Get full text
Article -
282
Civil substantive and procedural legal means of securing reparations for Ukraine
Published 2023-12-01Get full text
Article -
283
Developing an advanced classifier of threat for security agent behavior models
Published 2019-11-01Get full text
Article -
284
Precision Security: Integrating Video Surveillance with Surrounding Environment Changes
Published 2018-01-01“…Video surveillance plays a vital role in maintaining the social security although, until now, large uncertainty still exists in danger understanding and recognition, which can be partly attributed to intractable environment changes in the backgrounds. …”
Get full text
Article -
285
THE RUSSIAN’S DIGITAL SOVEREIGNTY AS A TECHNICAL BASIS OF INFORMATION SECURITY
Published 2016-12-01Subjects: Get full text
Article -
286
Security mechanisms and data access protocols in innovative wireless networks
Published 2018-09-01Get full text
Article -
287
Application of convolutional neural networks in the intelligence security system subsystem
Published 2020-08-01“…The article proposes the structure of an integrated security system for areal facilities. The main subsystems included in its composition are considered. …”
Get full text
Article -
288
Small Arms and Small Countries: Firearms and the International Security Agenda
Published 2016-05-01“…This article examines the emergence of the small arms trade on the international political agenda as a growing security threat. Employing the theoretical framework proposed by the Copenhagen School, this article argues that the issue of small arms gained traction at the international level in the context of the post-Cold War. …”
Get full text
Article -
289
Container Security Device Chain Network for Safe Railway Transportation
Published 2014-11-01“…This paper suggests the use of the container security devices (CSDs), which has been adopted for the marine transportation so far, to enhance the security of railway freight transportation. …”
Get full text
Article -
290
Qualitative analysis of it reliability and security in local government financial reporting
Published 2024-12-01Subjects: Get full text
Article -
291
Dependability and Security for Wireless Ad Hoc and Sensor Networks and Their Applications
Published 2013-07-01Get full text
Article -
292
Fairtrade, Food Security and Globalization: Building Alternative Food Systems
Published 2016-05-01Subjects: Get full text
Article -
293
THE RISE OF ETHNIC MILITIA, BANDITRY AND IMPLICATION ON NATIONAL SECURITY IN NIGERIA
Published 2022-05-01Subjects: Get full text
Article -
294
Neighbourhood, crime and fear: Exploring subjective perception of security in Serbia
Published 2025-01-01Subjects: “…security…”
Get full text
Article -
295
Cooperative secure transmission against collusive eavesdroppers in Internet of Things
Published 2020-06-01“…As Internet of Things (IoT) has boomed in recent years, many security issues have also been exposed. Focusing on physical layer security in wireless Internet of Things network communication, a series of security methods have been widely studied. …”
Get full text
Article -
296
Creating and Implementing an Effective and Deterrent National Cyber Security Strategy
Published 2020-01-01“…This paper presents a new national cyber security strategy (NCSS) covering the deterrence perspective from creation to implementation. …”
Get full text
Article -
297
Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks
Published 2013-01-01“…Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'…”
Get full text
Article -
298
Virtual Cloud Laboratories in Training of Specialists of the Direction “Computer Security”
Published 2015-12-01Get full text
Article -
299
Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services
Published 2014-01-01“…We also show how the security weaknesses of He et al.’s scheme can be addressed without degrading the efficiency of the scheme.…”
Get full text
Article -
300
INFORMATION SECURITY CONTROLS AS DETERMINANT OF CONTINUITY OF INFORMATION SYSTEM WORK
Published 2017-11-01Subjects: “…information security…”
Get full text
Article