Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2301
Analisis Kualitas Performa Aplikasi Digital Banking X Menggunakan Framework ISO 25010
Published 2023-07-01“…The conclusion is that the critical characteristic is security, which can refer to the evaluation quality of performance X application. …”
Get full text
Article -
2302
HIV and the gut microbiome: future research hotspots and trends
Published 2025-02-01Get full text
Article -
2303
Analisis Komparatif Keamanan Aplikasi Pengelola Kata Sandi Berbayar Lastpass, 1Password, dan Keeper Berdasarkan ISO/IEC 25010
Published 2023-08-01“…In addition, three applications have the same level of security in securing user data from unauthorized parties, and implement the use of digital signatures or certificates to prevent denial. …”
Get full text
Article -
2304
-
2305
Exploring real estate blockchain adoption: An empirical study based on an integrated task-technology fit and technology acceptance model.
Published 2025-01-01“…The study's findings indicate that attitude, perceived usefulness (PU) and data privacy and security (DPS) exerts highest influence in the proposed theoretical model. …”
Get full text
Article -
2306
A hybrid model of extended FMEA model based on F-PIPRECIA and Z-EDAS methods with Bow Tie to evaluate cybersecurity risks in Industry 4.0
Published 2024-03-01“…Cyber security issues have become a complex challenge for companies that obligating to Industry 4.0 paradigm. …”
Get full text
Article -
2307
Personal OAuth authorization server and push OAuth for Internet of Things
Published 2017-06-01“…However, Internet of Things security is an essential factor. OAuth is one of the most successful authentication and authorization protocols on the Internet. …”
Get full text
Article -
2308
NIGERIAN AIRFORCE STRATEGIC DEVELOPMENT AND CAPACITY IN THE FOURTH REPUBLIC, 2019-2023
Published 2024-09-01“…This situation has preoccupied the national security forces, including the Airforce which has carried out several operations to address these threats. …”
Get full text
Article -
2309
A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks
Published 2016-01-01“…With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. …”
Get full text
Article -
2310
Two-Party Quantum Private Comparison Protocol for Direct Secret Comparison
Published 2025-01-01“…A simulation on the IBM Quantum Platform demonstrates the protocol’s feasibility, and a security analysis confirms its robustness against potential eavesdropping and participant attacks. …”
Get full text
Article -
2311
THE UTILITY OF EARLY WARNING SYSTEM AND CRIME PREVENTION: A STUDY OF THE ABDUCTION OF SCHOOL CHILDREN IN NIGERIA
Published 2022-05-01“…This is essential for interrogation, as the abduction of school children has become a threat to national security. The paper used qualitative data from secondary literature and conceptualized theories of early warning signs to provide a theoretical base for its argument. …”
Get full text
Article -
2312
Motorcycle Engine Start System Using Fingerprint and Voice Command
Published 2023-06-01“…Making the starter engine system on this motorbike is to make it easier for users to turn on the motorbike without using a key so that they only use voice commands through an application found on an Android smartphone. In the security section, fingerprints are used as a substitute for manual ignition on motorbikes. …”
Get full text
Article -
2313
Cyberterrorism: content, forms and promising countermeasures
Published 2023-10-01“…The counteraction system may be based on the following: proper regulation of the concept of cyber terrorism in national legislation, criminalisation of acts of cyber terrorism and its components; enhancing the security and protection of critical information infrastructure; improving existing and applying new counteraction methods; improving cooperation in the field of combating cyber terrorism.…”
Get full text
Article -
2314
YOUTHS PROTEST IN NIGERIA: THE ENDSARS IN PERSPECTIVE
Published 2022-05-01“…However, where neglected, unskilled and lacked the requisite social security in the event of poor governance, low education, poor investment environment and other essential qualities of lives, youths becomeliability, threat and object of national instability to their country. …”
Get full text
Article -
2315
Impact of Occlusion Masks on Gender Classification from Iris Texture
Published 2024-01-01Get full text
Article -
2316
Application Research of Intelligent Classification Technology in Enterprise Data Classification and Gradation System
Published 2020-01-01“…Classification and gradation system adopts different security protection schemes for different types of data by implementing classification and gradation management of data, which is an important pretechnical means for data security protection and prevention of data leakage. …”
Get full text
Article -
2317
The use of technological innovations in military armaments -contemporary trends and future prospects
Published 2024-12-01“…The conclusions suggest that the development of new technologies will require appropriate international regulations, as well as new challenges related to ethics and security. Understanding these processes is crucial to ensuring global security. …”
Get full text
Article -
2318
Global agricultural trade architecture: contemporary triggers
Published 2024-12-01“…It has also been found that world agricultural commodity prices will stabilize in the medium term, which is an important factor in the food security of developing countries.…”
Get full text
Article -
2319
Authenticity at Risk: Key Factors in the Generation and Detection of Audio Deepfakes
Published 2025-01-01“…Detecting audio deepfakes is crucial to ensure authenticity and security, especially in contexts where audio veracity can have critical implications, such as in the legal, security or human rights domains. …”
Get full text
Article -
2320
Toward sustainable desalination: a patent analysis of technology-development trajectories
Published 2025-01-01“…Research and development (R&D) in desalination has enabled innovations and expanded global water-supply capacity to enhance water security. Despite increased desalination capacity, significant sustainability concerns persist. …”
Get full text
Article