Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
301
INFORMATION SECURITY CONTROLS AS DETERMINANT OF CONTINUITY OF INFORMATION SYSTEM WORK
Published 2017-11-01Subjects: “…information security…”
Get full text
Article -
302
Detection of Illegal Movement in Radioactive Material Transportation Security Systems
Published 2021-01-01Get full text
Article -
303
NIGERIAN YOUTH UNEMPLOYMENT AND SECURITY ISSUES: EVALUATING THE ENTREPRENEURSHIP OPTION
Published 2024-05-01Subjects: “…Security Challenger…”
Get full text
Article -
304
Scaling up Sustainable Agriculture and Food Security With Nanoscience and Technology
Published 2024-12-01Subjects: “…food security…”
Get full text
Article -
305
Secure Bootstrapping and Rebootstrapping for Resource-Constrained Thing in Internet of Things
Published 2015-08-01“…In Internet of Things, secure key establishment and building trust relationship between the thing and the home gateway (or the controller) in home network or Body Area Network are extremely important. …”
Get full text
Article -
306
The Security of Student Information Management System Based upon Blockchain
Published 2022-01-01“…This article aims to study the security of the student information management system based on the blockchain. …”
Get full text
Article -
307
Environmental and Socio-Political Security Risks Correlation in Mountainous Areas
Published 2025-01-01Subjects: Get full text
Article -
308
Literature Review of Machine Learning and Threat Intelligence in Cloud Security
Published 2025-01-01Subjects: Get full text
Article -
309
SPECIFICS TAIL RISKS THAT THREATEN ECONOMIC SECURITY OF INDUSTRIAL ORGANIZATIONS
Published 2017-02-01Subjects: Get full text
Article -
310
Ritual as mechanism for securing life and averting evil among the Krobo
Published 2008-06-01“…Two of the many functions of rituals are to secure blessings from the deity or to ward off evil. …”
Get full text
Article -
311
Reputation-Based Secure Sensor Localization in Wireless Sensor Networks
Published 2014-01-01“…In this paper, we propose a reputation-based security scheme for sensor localization to improve the security and the accuracy of sensor localization in hostile or untrusted environments. …”
Get full text
Article -
312
UK in European Security: New Opportunities or a Path to Nowhere?
Published 2015-04-01Subjects: Get full text
Article -
313
A secure method of voting and planning based on quadratic voting
Published 2025-02-01“…This method combines the voting and planning, and gives the ability to voters to express their opinions about the candidates programs in addition to voting. Then, a secure electronic voting protocol is proposed for implementing our method. …”
Get full text
Article -
314
Ubiquitous Systems towards Green, Sustainable, and Secured Smart Environment
Published 2015-01-01Get full text
Article -
315
STATISTICAL ANALYSIS THE FOOD SECURITY OF THE RUSSIAN FEDERATION IN THE REGIONAL CONTEXT
Published 2017-02-01Subjects: “…food security…”
Get full text
Article -
316
Mechanisms of Public Administration to Ensure Investment and Innovation Security of Territories
Published 2024-06-01“…The article analyzes the essence of the phenomenon of investment and innovation security, on the basis of which a qualitative assessment of the limits of the functionality of investment and innovation activities as components of economic security is formed. …”
Get full text
Article -
317
Methodology and software development for auditing information security management systems
Published 2022-12-01Subjects: Get full text
Article -
318
A Novel Authentication Management for the Data Security of Smart Grid
Published 2024-01-01Subjects: Get full text
Article -
319
THE RISE OF ETHNIC MILITIA, BANDITRY AND IMPLICATION ON NATIONAL SECURITY IN NIGERIA
Published 2022-05-01Subjects: Get full text
Article -
320
Cumulated Checksum and Dynamic Addresses for Secure Wireless Sensor Networks
Published 2016-07-01“…In this paper, we argue that the long-hold design principles of data link layer protocols are unreasonable from the perspective of wireless security. A secure ARQ scheme for wireless sensor networks named Sec-ARQ is proposed. …”
Get full text
Article