Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2361
Important factors in municipality-based pediatric palliation from healthcare professionals’ perspective: A qualitative study
Published 2025-01-01“…Conclusion: The importance of establishing security and predictability in municipality-based PPC was emphasized. …”
Get full text
Article -
2362
An Improved Deep Belief Network IDS on IoT-Based Network for Traffic Systems
Published 2022-01-01“…The security challenges such as privacy, scalability, authenticity, trust, and centralization thwart the quick adaptation of the smart services; hence, effective solutions are needed to be in place. …”
Get full text
Article -
2363
-
2364
Advancements in training and deployment strategies for AI-based intrusion detection systems in IoT: a systematic literature review
Published 2025-01-01“…Abstract As the Internet of Things (IoT) grows, ensuring robust security is crucial. Intrusion Detection Systems (IDS) protect IoT networks from various cyber threats. …”
Get full text
Article -
2365
Emergency Water Supply Dispatching Model for Saving and Storing Fresh Water in River Network Areas Influenced by Saltwater Intrusion
Published 2025-01-01“…Besides, when the salinity of Modaomen Waterway exceeds the standard level, Tielushan Reservoir is employed to drain the fresh water and regulate the salinity, which can further improve the water supply security and alleviate the influence of saltwater intrusion.…”
Get full text
Article -
2366
Armies of War Without Uniforms: Mercenaries and Private Military Companies in Russia’s Interventions in Syria and Ukraine
Published 2023-04-01“…The changing perception of security is the main reason for the resurgence of mercenary activities. …”
Get full text
Article -
2367
A Big Data Analytics Approach for Dynamic Feedback Warning for Complex Systems
Published 2020-01-01Get full text
Article -
2368
Transformation of the currency regulation regime and foreign economic relations of Russia in the context of expanding anti-Russian sanctions
Published 2024-11-01“…The article discusses the features of currency regulation and foreign economic relations of the Russian Federation (hereinafter referred to as RF, Russia) in the context of the introduction and growth of anti-Russian sanctions by the United States of America, European Union countries and other unfriendly countries, issues related to ensuring the sustainability of the Russian economy and its ability to withstand negative internal and external influences, issues of financial security, which is an important component of the country’s economic security, issues of the current state of the state’s banking system and the Russian economy as a whole. …”
Get full text
Article -
2369
Antecedents of smart tourism destination perceived attractiveness and behavioral intention for digital natives
Published 2024-11-01“…The study has found that digital natives view of interactivity and digital security can influence their assessment of STD attractiveness. …”
Get full text
Article -
2370
Digital Literacy Education Among Students: Status, Pathways, and Implications in the Current Digital Era
Published 2025-02-01“…However, students from urban areas demonstrate significantly higher digital literacy levels compared to those from rural areas, particularly in security and privacy domains. The findings underscore the need for targeted interventions to enhance digital literacy in areas such as digital content creation and problem-solving. …”
Get full text
Article -
2371
A lightweight privacy preservation authentication protocol for IoMT using ECC based blind signature
Published 2025-01-01“…This research proposes a protocol for secure authentication of IoMT devices while protecting user privacy. …”
Get full text
Article -
2372
Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review
Published 2024-01-01“…The paper presents a systematic review of intrusion detection in Internet of Things (IoT) networks using multi-objective optimization algorithms (MOA), to identify attempts at exploiting security vulnerabilities and reducing the chances of security attacks. …”
Get full text
Article -
2373
Detecting Cross-Site Scripting in Web Applications Using Fuzzy Inference System
Published 2018-01-01“…Cross-site scripting (XSS) is a form of web security attack which involves the injection of malicious codes into web applications from untrusted sources. …”
Get full text
Article -
2374
A User Authentication Scheme Using Physiological and Behavioral Biometrics for Multitouch Devices
Published 2014-01-01“…Although forcing users to change password periodically can enhance the security level, it may also be considered annoyances for users. …”
Get full text
Article -
2375
Protecting Compressive Ghost Imaging with Hyperchaotic System and DNA Encoding
Published 2020-01-01“…As computational ghost imaging is widely used in the military, radar, and other fields, its security and efficiency became more and more important. …”
Get full text
Article -
2376
Ungoverned Spaces and Menace of Herder-Farmer Conflictin Ondo State, South West Nigeria
Published 2023-03-01“…Drones can be deployed to monitor the operation of herders in the forests. Amotekun security outfit should be trained and adequately equipped with weapons for maximum delivery.…”
Get full text
Article -
2377
A Rectangular Planar Spiral Antenna for GIS Partial Discharge Detection
Published 2014-01-01Get full text
Article -
2378
Multiobjectives for Optimal Geographic Routing in IoT Health Care System
Published 2022-01-01“…The IoT network is wireless, which leads to security breaches. Therefore, there is a necessity to have a secured data transmission in the context of healthcare. …”
Get full text
Article -
2379
A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks
Published 2014-01-01Get full text
Article -
2380
Medical Image Encryption and Decryption Based on DNA: A Survey
Published 2023-09-01“…If DNA is employed appropriately, it can be used to achieve a number of security technologies, including encryption, steganography, signature, and authentication through the use of DNA molecules as information carriers. …”
Get full text
Article