Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2021
-
2022
Official Development Assistance in Japan's Strategy in Central Asia
Published 2020-07-01“…The author comes to the conclusion that realism-based objectives such as getting access to the natural resources of the region, securing its geopolitical stance in the heart of Eurasia and ensuring the support for Japan’s bid to the UN Security Council seat by five Central Asian states dominate Japan’s ODA policy. …”
Get full text
Article -
2023
A Metaheuristic Approach to Detecting and Mitigating DDoS Attacks in Blockchain-Integrated Deep Learning Models for IoT Applications
Published 2024-01-01“…As a concern of its huge evolution, privacy, and security are vital problems where IoT devices are always susceptible to cyberattacks. …”
Get full text
Article -
2024
Mathematical Modeling of Cyberattack Defense Mechanism Using Hybrid Transfer Learning With Snow Ablation Optimization Algorithm in Critical Infrastructures
Published 2025-01-01“…As digitalization upsurges, the requirement for cybersecurity measures becomes even more vital for numerous networks. To certify the security of critical infrastructures, numerous cyber security solutions must be taken together and the essential infrastructure must be developed. …”
Get full text
Article -
2025
System-Level Digital Twin Modeling for Underwater Wireless IoT Networks
Published 2024-12-01“…We introduce a voting-based security prediction model to significantly bolster security in underwater wireless communication. …”
Get full text
Article -
2026
Ex vivo detection of recreational consumed nitrous oxide in exhaled breath
Published 2025-01-01Get full text
Article -
2027
Physical Inactivity and Food Insecurity Are Associated with Social Capital: A Large-Scale Population-Based Study in Tehran
Published 2022-01-01“…There are limited studies on food security, physical activity, and social capital in the Iranian population. …”
Get full text
Article -
2028
Prototype Sistem Keamanan Mobil dengan Menggunakan Quick Response Code Berbasis Android dan Arduino
Published 2019-05-01“…This research succeeded in making prototype car security system based on Android and Arduino. …”
Get full text
Article -
2029
-
2030
Global Detection of Live Virtual Machine Migration Based on Cellular Neural Networks
Published 2014-01-01Get full text
Article -
2031
Unobtrusive Behavioral and Activity-Related Multimodal Biometrics: The ACTIBIO Authentication Concept
Published 2011-01-01“…Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system, which uses a biodynamic physiological profile, unique for each individual, and advancements of the state of the art in unobtrusive behavioral and other biometrics, such as face, gait recognition, and seat-based anthropometrics. …”
Get full text
Article -
2032
Analysis and Improvement of a Robust User Authentication Framework for Ubiquitous Sensor Networks
Published 2014-03-01“…Another is using the Hardware Security Module. After a simple analysis, we have proved that the improved scheme can resist the collusion attack.…”
Get full text
Article -
2033
Discrete event simulation–based energy efficient path determination scheme for probabilistic voting–based filtering scheme in sensor networks
Published 2020-08-01“…Several en-route filtering schemes mainly focus on saving energy through early detection of false data within a short distance against these attacks; however, they cannot immediately block the false data injected by compromised nodes. A security scheme uses context-aware architecture for a probabilistic voting–based filtering scheme to detect the compromised nodes and block the injection of false data, unlike security protocols. …”
Get full text
Article -
2034
Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure
Published 2014-01-01“…Thus, in order to establish a secure connection to transmit electricity consumption data, encryption is necessary, for which key distribution is required. …”
Get full text
Article -
2035
Random-Parameters Behavioral Models to Investigate Determinants of Perceived Safety in Railway Stations
Published 2021-01-01“…The estimation results for a medium-sized railway station (Frosinone, Italy) confirmed that safety and security measures are not equally perceived by individuals and the use of random-parameters models leads to more robust estimates. …”
Get full text
Article -
2036
Cryptanalysis of an Image Encryption Algorithm Using DNA Coding and Chaos
Published 2025-01-01“…Through our comprehensive security analysis, we found a security vulnerability in the mechanism of the association between the key and plaintext and proposed a breaking scheme. …”
Get full text
Article -
2037
APP: An Ultralightweight Scheme to Authenticate ONS and Protect EPC Privacy without Cryptography in EPCglobal Networks
Published 2013-06-01“…In this paper, we make the first attempt to solve those two security risks together without relying cryptography. …”
Get full text
Article -
2038
Numerical Simulation of Recycled Concrete Using Convex Aggregate Model and Base Force Element Method
Published 2016-01-01Get full text
Article -
2039
Fast contrast enhancement by adaptive pixel value stretching
Published 2018-08-01Get full text
Article -
2040
Trust Management Scheme Based on D-S Evidence Theory for Wireless Sensor Networks
Published 2013-06-01“…Trust management scheme has been regarded as a powerful tool to defend against the wide set of security attacks and identify malicious nodes. In this paper, we propose a trust management scheme based on revised Dempster-Shafer (D-S) evidence theory. …”
Get full text
Article