Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
321
The Security Needs of International Students: An Analysis in Terms of the Securitization Theory
Published 2023-06-01“…In some states, these students are considered a potential threat to national security and subject to various inequalities of opportunity, however, ironically, the states do not adequately address the higher education policies regarding the security needs of international students. …”
Get full text
Article -
322
Main threats to the state’s interests in the sphere of information security of Ukraine
Published 2024-03-01Subjects: “…information security…”
Get full text
Article -
323
Load-Balanced Secure Routing Protocol for Wireless Sensor Networks
Published 2013-06-01“…To solve the problems of limited energy of the nodes and security of routing in wireless sensor networks, load-balanced secure routing protocol (LSRP), a load-balanced secure routing protocol for wireless sensor networks, is proposed. …”
Get full text
Article -
324
The National Police of Ukraine activities in the sphere of ensuring national security
Published 2023-07-01Subjects: Get full text
Article -
325
IMPACT ASSESSMENT OF NIGERIA POLICE FORCE ON THE SECURITY MAINTANANCE IN NIGERIA
Published 2024-06-01Subjects: “…Security…”
Get full text
Article -
326
A New Data Coding Algorithm for Secure Communication of Image
Published 2024-11-01“…This paper proposes a new entropy-sensitive based data coding algorithm for the secure communication of image information between transceiver systems. …”
Get full text
Article -
327
Formal Security in the Works of Legal Scholars of Pre-Soviet Period
Published 2021-07-01Subjects: “…formal security…”
Get full text
Article -
328
Secure computation protocol of Chebyshev distance under the malicious model
Published 2024-07-01“…Especially within electronic archival management systems, secure computation of Chebyshev distance is employed for similarity measurement, classification, and clustering of sensitive archival information, thereby enhancing the security of sensitive archival queries and sharing. …”
Get full text
Article -
329
Euro-Atlantic Security in U.S.-EURussia Triangle and Trump Factor
Published 2019-12-01Subjects: “…euro-atlantic security system…”
Get full text
Article -
330
Military and political security in the Arctic before and amidst the Ukrainian crisis
Published 2024-11-01Subjects: Get full text
Article -
331
The Security Weakness of Block Cipher Piccolo against Fault Analysis
Published 2014-03-01Get full text
Article -
332
Exploring the dynamics of energy security and energy poverty in the Andean basin
Published 2025-12-01Subjects: “…Energy security…”
Get full text
Article -
333
LEGAL MIGRATION – RIGHTS AND BENEFITS IN THE EUROPEAN SOCIAL SECURITY SYSTEM
Published 2024-12-01Subjects: Get full text
Article -
334
A Secure and Efficient White-Box Implementation of SM4
Published 2024-12-01“…Although researchers have made great efforts to enhance security against DCA, most solutions considerably decrease algorithmic efficiency. …”
Get full text
Article -
335
Changing role of security alliances in the post-Cold War era
Published 2024-07-01“…In the aftermath of the Cold War, both scholars and experts frequently questioned the political relevance of security alliances, given the declining intensity of armed conflicts and the decreasing probability of major interstate wars. …”
Get full text
Article -
336
Secured Routing Protocol for Improving the Energy Efficiency in WSN Applications
Published 2024-01-01“…The data have been saved using a variety of security procedures that have been developed in past research studies. …”
Get full text
Article -
337
Evolution of Biotechnology and Information Technology and Its Impact on Human Security
Published 2015-10-01Subjects: Get full text
Article -
338
Impact of Dual Placement and Routing on WDDL Netlist Security in FPGA
Published 2013-01-01Get full text
Article -
339
A Clonal Selection Optimization System for Multiparty Secure Computing
Published 2021-01-01“…Furthermore, this research attempts to improve the privacy security defense capability of the federated learning scheme for big data through differential privacy preprocessing. …”
Get full text
Article -
340
MODEL OF CREATION AND RE-ENGINEERING PRINCIPLES OF THE ECONOMIC SECURITY OF THE COMPANY
Published 2016-03-01“…The research allowed creating a model of economic security company. In the model, the factors influencing the process. …”
Get full text
Article