Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
441
End-to-End Security Mechanism Using Blockchain for Industrial Internet of Things
Published 2025-01-01Subjects: Get full text
Article -
442
Editorial: Artificial Intelligence-based Security Applications and Services for Smart Cities
Published 2024-08-01Get full text
Article -
443
CLIMATE CHANGE AND LAND-BASED CONFLICT: THE IMPACT ON FOOD SECURITY IN NIGERIA
Published 2022-05-01Subjects: Get full text
Article -
444
Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT)
Published 2016-01-01Get full text
Article -
445
Privacy and Security in Digital Health Contact-Tracing: A Narrative Review
Published 2025-01-01“…Such acceptance depends on public perceptions and are likely influenced by privacy and security concerns. Therefore, this review evaluates public perceptions towards the privacy and security of contact-tracing apps used during the recent COVID-19 pandemic, with a focus on identifying factors that influence acceptance. (2) Methods: A systematic literature review was performed. …”
Get full text
Article -
446
Navigating the Challenges and Opportunities of Securing Internet of Autonomous Vehicles With Lightweight Authentication
Published 2025-01-01“…We also highlight the fast lightweight security protocols implemented on heterogeneous embedded, low-power, high-performance computing platforms as a viable solution to address these challenges.…”
Get full text
Article -
447
Juridical construction of socio-ecological security: Indonesia’s vulnerability to climate change
Published 2025-01-01“…This research is a normative study that examines the legal framework of socio-ecological security concerning Indonesia’s vulnerability as an archipelagic nation due to the impacts of climate change. …”
Get full text
Article -
448
Analysis of Russian Federation Foreign Policy in the Field of International Information Security
Published 2014-12-01Subjects: “…international information security…”
Get full text
Article -
449
Producing secure multimodal biometric descriptors using artificial neural networks
Published 2021-03-01“…Abstract With the rapidly growing use of biometric authentication systems, the security of these systems and the privacy of users have attracted significant attention in recent years. …”
Get full text
Article -
450
THE EUROPEAN UNION (EU) AND THE CLIMATE-SECURITY NEXUS: CSDP MISSIONS AND OPERATIONS
Published 2022-12-01Subjects: Get full text
Article -
451
Management of labor behavior of employees as a factor of economic security of the organization
Published 2019-09-01Get full text
Article -
452
Digital economic security of Russian organizations, industries and Russia as a whole
Published 2019-09-01Subjects: “…digital economic security of the organization…”
Get full text
Article -
453
Organization of the National Police activities as a subject of the security and defense sector
Published 2022-06-01Subjects: “…security sector…”
Get full text
Article -
454
Energy Efficiency Maximization with Optimal Beamforming in Secure MISO CRNs with SWIPT
Published 2021-01-01Get full text
Article -
455
Health Monitoring System for Nursing Homes with Lightweight Security and Privacy Protection
Published 2017-01-01“…So this paper proposed a health monitoring system with lightweight security and privacy protection for nursing homes. …”
Get full text
Article -
456
Secure Microprocessor-Controlled Prosthetic Leg for Elderly Amputees: Preliminary Results
Published 2011-01-01“…Our artificial knee has been designed to fulfill the specific requirements of this population in terms of capabilities, transfer assistance, security, intuitiveness, simplicity of use, and types of physical activity to be performed. …”
Get full text
Article -
457
Security environment of the state in the context of the Ministry of Internal Affairs of Ukraine activities
Published 2023-06-01Subjects: “…security…”
Get full text
Article -
458
Enhancing food and nutrition security in Himalayan foothills with neglected and underutilized millets
Published 2025-01-01Subjects: “…Food security…”
Get full text
Article -
459
Access to Network Login by Three-Factor Authentication for Effective Information Security
Published 2016-01-01“…In this way managing additional secret key includes an additional layer of security.…”
Get full text
Article -
460
Police crime in 1947 in the coverage of the Ukrainian SSR state security agencies
Published 2022-12-01Subjects: Get full text
Article