Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
501
Secure Pesticide Storage: Using and Managing a Pesticide Storage Facility
Published 2004-10-01“…Revised: November 2004. PI33/PI068: Secure Pesticide Storage: General Features (ufl.edu) …”
Get full text
Article -
502
Synchronization of chaotic optomechanical system with plasmonic cavity for secured quantum communication
Published 2025-01-01“…Our findings pave the way for enhanced coherence and reliability in secure quantum communication systems, thus contributing to the advancement of this rapidly evolving field.…”
Get full text
Article -
503
Application of the Gordon Loeb model to security investment metrics: a proposal
Published 2024-12-01Subjects: Get full text
Article -
504
A Security Data Forwarding Mechanism for Sparse Social Sensor Networks
Published 2015-08-01Get full text
Article -
505
The Problem of Energy Security in the Early 21st Century: Challenges and Opportunities
Published 2013-02-01Subjects: “…energy security…”
Get full text
Article -
506
Formation of psychological security of the educational environment (on the example of the school in the Altai Republic)
Published 2020-12-01Subjects: Get full text
Article -
507
A distributed data secure transmission scheme in wireless sensor network
Published 2017-04-01“…Therefore, it is difficult to ensure security of broadcasting data transferred from a single wireless sensor node to base station. …”
Get full text
Article -
508
An Investigation into Information Security Managerial Practices in Selected Public Sector Organizations.
Published 2023“…The study aims to examine information security managerial practices in organisations. It was guided by three specific objectives: identification of information security practices critical to information assets management; establishment of implementation processes involved in the execution of structured information security governance; and evaluation of policies that influence information security best practices. …”
Get full text
Article -
509
-
510
D. Ricardo’s theory of comparative advantages as applied to interest rate swaps in the financial market
Published 2023-11-01Subjects: Get full text
Article -
511
-
512
Adaptive Security Solutions for NOMA Networks: The Role of DDPG and RIS-Equipped UAVs
Published 2024-11-01Subjects: “…non-orthogonal multiple access, reconfigurable intelligent surface, unmanned aerial vehicles, deep reinforcement learning, deep deterministic policy gradient, physical layer security.…”
Get full text
Article -
513
Improving Network Security: An Intelligent IDS with RNN-LSTM and Grey Wolf Optimization
Published 2024-12-01“…The architecture of this RNN-LSTM with GWO IDS provides capable and responsive intrusion detection, training on previous data to be able to detect new threats. Made for network security by combining deep learning and optimization, tests reached 99.5% accurate. …”
Get full text
Article -
514
Secure UAV-Based System to Detect Small Boats Using Neural Networks
Published 2019-01-01“…Given the high sensitivity of the managed information, the proposed system includes cryptographic protocols to protect the security of communications.…”
Get full text
Article -
515
INTERNAL CONTROL AS A TOOL OF SUPPORT ECONOMIC SECURITY OF THE ORGANIZATION AT THE MICRO LEVEL
Published 2021-04-01Subjects: Get full text
Article -
516
Advanced Approach to Information Security Management System Model for Industrial Control System
Published 2014-01-01“…Therefore, a new information security management system based on confidentiality, integrity, and availability as well as safety is required for ICSs. …”
Get full text
Article -
517
Legal Regulation of Interaction of Security Service of Ukraine with Civil Society in Counteracting Terrorism
Published 2019-09-01“…The comparative legal method of the study analyzes the source base of national law concerning the interaction of the Security Service of Ukraine with civil society in fighting against terrorism. …”
Get full text
Article -
518
THE SECURITY ASPECT OF TURKEY-UNITED STATES RELATIONS: IN SEARCH FOR A NEW MODEL
Published 2016-04-01“…Security cooperation has always been an important aspect of the relations between Turkey and the USA. …”
Get full text
Article -
519
Enhancing concealed object detection in active THz security images with adaptation-YOLO
Published 2025-01-01Subjects: “…Active terahertz (THz) security image…”
Get full text
Article -
520
Aukus (Australia-united kingdom-united states) threat to Indo-pacific security
Published 2024-11-01“…Countries can change their defense budgets based on their assessment of security threats in the region and changes in the balance of power. …”
Get full text
Article