Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2101
Impacts of Cultivated Land Reclamation on the Climate and Grain Production in Northeast China in the Future 30 Years
Published 2013-01-01“…The result of this study can provide some theoretical support to the agricultural economic development in Northeast China and serve the national macropolicy and food security strategy of the whole China.…”
Get full text
Article -
2102
-
2103
Systematic Literature Review of Machine Learning Models for Detecting DDoS Attacks in IoT Networks
Published 2024-12-01“…Recognizing deep learning's effectiveness sets the stage for refining IoT security protocols, and moreover, by identifying challenges, the research informs strategies to enhance IoT security, fostering a resilient framework.…”
Get full text
Article -
2104
Downlink Multiuser Hybrid Beamforming for MmWave Massive MIMO-NOMA System with Imperfect CSI
Published 2019-01-01Get full text
Article -
2105
A novel and highly efficient botnet detection algorithm based on network traffic analysis of smart systems
Published 2022-03-01Get full text
Article -
2106
A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things
Published 2019-12-01“…With the development of the Internet of Things, smart devices are widely used. Hardware security is one key issue in the security of the Internet of Things. …”
Get full text
Article -
2107
Legislation and Policy Capacities in Agricultural Water for Adapting to Climate Change in Iran
Published 2025-07-01“…Iran has taken various initiatives, enacting related laws and establishing policy measures, to respond to water scarcity and food security in the agricultural sector. This study was conducted to understand and explore Iran’s initiatives, especially through legislation and policy responses, to address water scarcity and food security under CC conditions. …”
Get full text
Article -
2108
Automatic Algorithm for Fractal Plant Art Image Similarity Feature Generation
Published 2021-01-01“…The scheme combines SIFT (scale-invariant feature transform) feature secure extraction and locally sensitive hashing algorithm to achieve secure extraction of BOVW features of images. …”
Get full text
Article -
2109
-
2110
On Eavesdropping Attacks in Wireless Sensor Networks with Directional Antennas
Published 2013-08-01“…The eavesdropping attack is a serious security threat to a wireless sensor network (WSN) since the eavesdropping attack is a prerequisite for other attacks. …”
Get full text
Article -
2111
The Application of a Desktop NMR Spectrometer in Drug Analysis
Published 2018-01-01Get full text
Article -
2112
Masked and Unmasked Face Recognition Model Using Deep Learning Techniques. A case of Black Race.
Published 2023“…Currently, many institutions of higher learning in Uganda are faced with major security threats ranging from burglary to cyber threats. …”
Get full text
Article -
2113
Masked and unmasked Face Recognition Model Using Deep Learning Techniques. A case of Black Race.
Published 2024“…Currently, many institutions of higher learning in Uganda are faced with major security threats ranging from burglary to cyber threats. …”
Get full text
Article -
2114
-
2115
Devlet-içi Çatışmalarda Üçüncü Taraf Aktörler: Suriye İç Savaşında Türkiye’nin Rolü
Published 2019-12-01“…The aim of this study is to reveal how decisive the perception of national security is to Turkey's existing or prospective intervention, and to what extent this situation contributes to the behavior and methods of other actors, who are involved in the conflict. …”
Get full text
Article -
2116
Breaking barriers in two-party quantum cryptography via stochastic semidefinite programming
Published 2025-01-01“…In the last two decades, there has been much effort in finding secure protocols for two-party cryptographic tasks. …”
Get full text
Article -
2117
«HYBRID WAR» OF NOTIONS
Published 2016-10-01“…Ofer Fridman holds the degrees of BA (Military History and Security Studies) from Hebrew University, MA (Counter-Terror and Homeland Security) from Interdisciplinary Center Herzliya and PhD (Political Science, supervised by Prof. …”
Get full text
Article -
2118
-
2119
-
2120
To use and engage? Identifying distinct user types in interaction with a smartphone-based intervention
Published 2025-03-01Get full text
Article