Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2261
Le paysage à l’épreuve des « nouveaux » défis de l’aménagement du territoire au Maroc : contraintes et perspectives
Published 2009-06-01“…The Moroccan regional planning was often marked by security concerns, based on historic inheritances of conflicting relations between central authority and tribes. …”
Get full text
Article -
2262
GTrust: Group Extension for Trust Models in Distributed Systems
Published 2014-02-01Get full text
Article -
2263
Dynamics and Control of Worm Epidemic Based on Mobile Networks by SEIQR-Type Model with Saturated Incidence Rate
Published 2021-01-01“…The mobile networks have increasingly facilitated our daily life but are also breeding grounds for malicious worms, which are considered as the main threat to cyber security. The purpose of this paper is to analyze the dynamics of worm propagation and to control the worm epidemic based on mobile-phone networks. …”
Get full text
Article -
2264
A Novel Algorithm for Defending Path-Based Denial of Service Attacks in Sensor Networks
Published 2010-12-01“…Existing end-to-end security mechanisms are vulnerable to path-based denial of service attacks (PDoS). …”
Get full text
Article -
2265
On the Implementation of a Dynamic Direction Modulation System with Vector Modulators
Published 2019-01-01“…Dynamic directional modulation (DDM) has already proven to be an efficient technique to achieve physical layer security in wireless communications. System architectures based on vector modulators provide a flexible framework to implement synthesis methods that allow us to obtain increased security and/or independent multichannel transmissions. …”
Get full text
Article -
2266
Evolutionary Game and Numerical Simulation of Cultivated Land Protection Policies Implementation in China
Published 2021-01-01“…The effective implementation of cultivated land protection policies (CLPP) has important practical significance for improving China’s food security and ecological security. The central government, local governments, and farmers have mutually restricted and influencing interest relations. …”
Get full text
Article -
2267
Access Control Points: Reducing a Possible Blast Impact by Meandering
Published 2018-01-01“…Such control zones could be located within the building that has to be protected or attached to it. The elevated security needs for these areas call for a design that will consider the risk of internal explosive events. …”
Get full text
Article -
2268
A Dynamically Reconfigured Multi-FPGA Network Platform for High-Speed Malware Collection
Published 2012-01-01“…Malicious software has become a major threat to computer users on the Internet today. Security researchers need to gather and analyze large sample sets to develop effective countermeasures. …”
Get full text
Article -
2269
Elliptic-Curve Cryptography Implementation on RISC-V Processors for Internet of Things Applications
Published 2024-01-01“…Elliptic-curve cryptography (ECC) is a popular technique of public-key cryptography used for secure communications in Internet of Things (IoT) applications. …”
Get full text
Article -
2270
Rising infrastructure inequalities accompany urbanization and economic development
Published 2025-01-01Get full text
Article -
2271
Research and Evaluation on Dynamic Response Characteristics of Various Pavement Structures
Published 2022-01-01Get full text
Article -
2272
Innovative Technologies for Improved Water Productivity and Climate Change Mitigation, Adaptation, and Resilience: A Review
Published 2025-02-01“… Water scarcity, exacerbated by climate change, poses severe challenges to agriculture, food security, and sustainable development, particularly in vulnerable regions. …”
Get full text
Article -
2273
DIAGNOSTIC EVALUATION OF URBAN METRO TRANSIT SYSTEM POST-COVID-19
Published 2024-09-01“…The survey covers commuter perceptions of safety & security, financial & economic factors, infrastructure & comfort and functional & operational features. …”
Get full text
Article -
2274
Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks
Published 2015-01-01“…The existing solutions are vulnerable to such a type of security attacks, called manipulated compilation attacks (MCAs), since they assume that CHs are uncompromised. …”
Get full text
Article -
2275
Second-degree branch structure blockchain expansion model
Published 2022-03-01“…Finally, a set of malicious attacks is simulated to realize the security constraints of the blockchain, to verify the security of the second-degree branch chain model. …”
Get full text
Article -
2276
Ranking the Return on Assets of Tehran Stock Exchange by a New Method Based on Z-Numbers Data
Published 2023-01-01“…The advantage of this method over conventional fuzzy methods is considering uncertainty and allocating credit in the opinion of experts to estimate fuzzy parameters, and in the second example, we ranked the factors which affect the productivity of tourism security. Then, by using the proposed algorithm, we introduce the most important and the least important factors for tourist security budgeting.…”
Get full text
Article -
2277
DEMOCRACY AND THE FIGHT AGAINST LEADERSHIP CORRUPTION IN SUB-SAHARAN AFRICA: IMPLICATION FOR CONTINENTAL DEVELOPMENT
Published 2024-08-01“… This paper examines democracy and the fight against leadership corruption in relation to Africa and its implication on development and security issues using a qualitative data gathering and analysis method. …”
Get full text
Article -
2278
Challenges in providing correctional service education: A case study in a correctional institution in Amhara regional state, Ethiopia
Published 2023-06-01“…It was concluded that the majority of challenges faced in the case correctional institution occurred as a result of inadequate attention and conflicting missions of the correctional institution (security and rehabilitation) and the tendency of prioritizing security over rehabilitation. …”
Get full text
Article -
2279
Comparison of Military Potentials of USA, PRC, and Some Countries in APR from the Standpoint of Western Analysts
Published 2012-08-01“…In connection with the rising significance of the APR in the global economy, Western military and political analysts consider the PRC power strengthening as a challenge to the security and impact of the USA not only in this region, but also globally. …”
Get full text
Article -
2280
eDAAAS: Efficient distributed anonymous authentication and access in smart homes
Published 2016-12-01“…Internet of Things applications for the smart home are very heterogeneous and continuously increasing in number, making user management from a security perspective very challenging. Moreover, the resource-constrained nature of most of the devices implies that any security mechanisms deployed should be lightweight and highly efficient. …”
Get full text
Article