Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2461
-
2462
A Novel Scheme for Construction of S-Box Using Action of Power Associative Loop and Its Applications in Text Encryption
Published 2024-01-01“…The Avalanche Effect test is used to examine the effectiveness of our technique, and it confirmed the robustness and security of our encryption scheme.…”
Get full text
Article -
2463
EPPTA: Efficient partially observable reinforcement learning agent for penetration testing applications
Published 2025-01-01“…Abstract In recent years, penetration testing (pen‐testing) has emerged as a crucial process for evaluating the security level of network infrastructures by simulating real‐world cyber‐attacks. …”
Get full text
Article -
2464
-
2465
A Multi-Signature Scheme for Defending Malleability Attack on DeFi
Published 2025-01-01“…Signatures are crucial in blockchain-based Decentralised Finance (DeFi) protocols because they ensure the security and integrity of transactions and smart contracts. …”
Get full text
Article -
2466
Levels Politechnic Community Satisfaction to The Use of Lebuhraya Pantai Timur 2
Published 2018-11-01“…Results of this analysis showed a mean value for items 'security level' in LPT2 is 2.29, i.e. at low mean score. …”
Get full text
Article -
2467
Trust-Centric and Economically Optimized Resource Management for 6G-Enabled Internet of Things Environment
Published 2024-12-01“…TEO-IoT presents an end-to-end solution for security management and network traffic optimization, utilizing advanced algorithms for trust score estimation and anomaly detection. …”
Get full text
Article -
2468
Examination and the State of Intoxication: Features of Legal Regulation and Observance of Human Rights and Freedoms
Published 2020-06-01“…In other circumstances, such an examination of intoxication should be considered inadmissible evidence in an administrative offense case, since it was obtained in substantial violation of human rights and freedoms, including the right to liberty and security, as well as a number of other rights, which the detained person failed to exercise. …”
Get full text
Article -
2469
Violent crime motivated by war-related hate: concepts, signs, development trends
Published 2023-12-01“…Attention is focused on the fact that manifestations of violence and aggression in society pose a real threat to the stability of the existence of the entire human civilization, which carries potential threats to the national security of Ukraine, as well as to regional and global security. …”
Get full text
Article -
2470
An intrusion detection system for the prevention of an active sinkhole routing attack in Internet of things
Published 2019-11-01“…Therefore, the IoT network should be secured against intrusions and disruptions; the data exchanged throughout the network should be an encrypted form. …”
Get full text
Article -
2471
Research on Grid Scroll Chaotic Extended Sequence Algorithm and Its Circuit Implementation for F-OFDM System
Published 2019-01-01“…The proposed grid multiscroll chaotic maps are used as random phase sequence vectors instead of the traditional pseudo random sequence, which provide a large number of random sequences with good correlation characteristics, random characteristics, and high security. The proposed random phase sequence vectors can meet the needs of 5G mass connections. …”
Get full text
Article -
2472
Challenges in Microgrids with Medium Voltage Circuit
Published 2025-01-01“…Effective coordination between protection devices and management systems ensures a rapid and selective response to faults, thereby enhancing microgrid security and facilitating efficient problem detection and resolution. …”
Get full text
Article -
2473
-
2474
Simultaneous Presentation of a Right Littre’s Hernia and a Left Amyand’s Hernia in a School-Aged Patient
Published 2019-01-01Get full text
Article -
2475
Dialogue as a tool of nutrition literacy in an agricultural intervention programme in Odisha, India
Published 2022-05-01“…Results The methodology of dialogue as a pedagogic tool generated a discussion about food security among the community. CHFs identified key messages and shared them with fellow villagers in imaginative ways. …”
Get full text
Article -
2476
Quarantine and anti-epidemic measures as an element of Emergency Law in Ukraine
Published 2023-10-01“…The development and improvement of quarantine and anti-epidemic measures in the system of Emergency Law is crucial for ensuring the security and resilience of society. Sustained changes in global threats, such as pandemics, require constant analysis, updating and improvement of the legal response mechanism. …”
Get full text
Article -
2477
Modeling the Internet of Things network for monitoring audio information on the Amazon platform
Published 2021-08-01“…The algorithm for connecting devices to the AWS platform is given: creating a device certificate on the platform, creating a security policy, rules for processing information received from devices, and testing the network. …”
Get full text
Article -
2478
Baltic States in NATO: Results of the Decade
Published 2014-12-01“…This satisfies demands of the political elites and victimized public consciousness for more security, makes it possible for elites to consider their states as bulwark against Russia. …”
Get full text
Article -
2479
Use of Extra-judicial Technical Surveillance in Criminal Decision-making: European Limitations and National Challenges
Published 2024-12-01“…The case law of the European Court of Human Rights in Strasbourg has consistently stated that even a severe threat to national security, such as acts of terrorism, or other risks of a global nature are not to be relied upon in order to override this form of protection and control. …”
Get full text
Article -
2480
A Scalable Framework for Sensor Data Ingestion and Real-Time Processing in Cloud Manufacturing
Published 2025-01-01“…However, existing frameworks face challenges related to scalability, resource orchestration, and data security, particularly in rapidly evolving decentralized manufacturing settings. …”
Get full text
Article