Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
381
Education as a Fundamental Element in Ensuring the National Security of the State
Published 2024-12-01Subjects: “…national security of the state…”
Get full text
Article -
382
Water security assessment framework for deltas of the transboundary river basins
Published 2023-07-01Subjects: Get full text
Article -
383
Novel Chaos Secure Communication System Based on Walsh Code
Published 2015-01-01Get full text
Article -
384
A Resilience-Based Security Assessment Approach for CBTC Systems
Published 2021-01-01“…The CBTC system ensures safe and efficient operation of trains, so the quantitative assessment of cyber security is quite necessary. In this paper, a resilience-based assessment method is proposed to analyze the security level of CBTC systems based on indicators of both the cyber domain and the physical domain. …”
Get full text
Article -
385
The role of financial analysis in ensuring economic security of agricultural enterprise
Published 2022-03-01Subjects: Get full text
Article -
386
An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment
Published 2015-01-01“…Since the data needs to be secured throughout its life cycle, security of the data in cloud is a major challenge to be concentrated on because the data is in third party’s premises. …”
Get full text
Article -
387
Demographic crisis as a threat to the national security of the Russian Federation
Published 2012-10-01Subjects: Get full text
Article -
388
SECURITY OF LIVES, RIGHTS TO PEACEFUL ASSEMBLY AND THE ENDSARS PROTEST IN NIGERIA
Published 2023-07-01Subjects: “…Human Security…”
Get full text
Article -
389
Verification of serialising instructions for security against transient execution attacks
Published 2023-07-01“…However, errors and Trojans in the hardware implementation of lfence can be exploited to compromise the software mitigations that use lfence. The aforementioned security gap has not been identified and addressed previously. …”
Get full text
Article -
390
THE U.S. NATIONAL SECURITY COUNCIL IN CONTEMPORARY AMERICAN INTERNATIONAL STUDIES
Published 2016-08-01Subjects: Get full text
Article -
391
Aggregation Scheme with Secure Hierarchical Clustering for Wireless Sensor Networks
Published 2012-07-01“…Due to our IP naming rules and type 1 nodes as cluster heads, public key cryptography, such as RSA (Rivest, Shamir, Adleman), or ECC (Elliptic Curve Cryptosystem), is easily implanted to our system to strengthen our security. The sink node is the only certification authority in our system, but n level cluster heads can be extended to n level certification authorities if needed, where n is maximum number of level.…”
Get full text
Article -
392
Enhancing Security in International Data Spaces: A STRIDE Framework Approach
Published 2024-12-01“…Regulatory and technological frameworks such as International Data Spaces (IDS) have been developed to facilitate secure data exchange while integrating security and data sovereignty aspects required by laws and regulations, such as the GDPR and NIS2. …”
Get full text
Article -
393
Enhanced Lightweight Quantum Key Distribution Protocol for Improved Efficiency and Security
Published 2025-01-01“…Quantum Key Distribution (QKD) provides secure communication by leveraging quantum mechanics, with the BB84 protocol being one of its most widely adopted implementations. …”
Get full text
Article -
394
A Security Authentication Protocol for Trusted Domains in an Autonomous Decentralized System
Published 2016-03-01“…By applying BAN predicate logic and AVISPA security analysis tool of network interaction protocol, we can guarantee protocol security and provide complete safety tests. …”
Get full text
Article -
395
An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security
Published 2023-09-01“…However, IIoT involves some security vulnerabilities that are more damaging than those of IoT. …”
Get full text
Article -
396
Crop Diversification for Ensuring Sustainable Agriculture, Risk Management and Food Security
Published 2025-02-01Subjects: Get full text
Article -
397
Problems of the Use of Private Military and Security Companies in the US military operations
Published 2010-06-01Get full text
Article -
398
Climate change, economic security, and macroeconomic stability: Insights from the EU
Published 2025-01-01“…This research examines the impact of climate change risks on the macroeconomic situation and the security of the economic system in the EU-27 during the 2002-2020 period. …”
Get full text
Article -
399
A blockchain-based secure path planning in UAVs communication network
Published 2025-02-01Subjects: Get full text
Article -
400
TRANS-BORDER TRAJECTORIES AND HUMAN SECURITY IN NIGERIA: NORTHEAST AND NORTHWEST IN PERSPECTIVE
Published 2023-12-01Subjects: Get full text
Article