Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2521
THE ANALYSIS OF THE KEY DRIVERS AND BARRIERS OF CLOUD MIGRATION IN COMPANIES IN BOSNIA AND HERZEGOVINA
Published 2020-05-01“…According to the research results, the most significant obstacles of cloud migration include the fo-llowing: lack of internal experts, privacy, lack of respo-nsibility of cloud providers in case of security incident, costs and complexity of migration to the cloud, etc. …”
Get full text
Article -
2522
XI2S-IDS: An Explainable Intelligent 2-Stage Intrusion Detection System
Published 2025-01-01“…By leveraging SHAP values, XI2S-IDS enhances transparency in decision-making, allowing security analysts to gain clear insights into feature importance and the model’s rationale. …”
Get full text
Article -
2523
STATE POLICY TO COUNTER CRIME IN BORDER REGIONS IN A DIGITAL SOCIETY
Published 2024-03-01“…The purpose of the scientific report is to summarize the criminal risks of digitalization for the national security of border regions and to analyze some areas of state policy in the field of combating crime in a digital society. …”
Get full text
Article -
2524
Quantum theory-inspired inter-sentence semantic interaction model for textual adversarial defense
Published 2024-12-01“…Abstract Deep neural networks have a recognized susceptibility to diverse forms of adversarial attacks in the field of natural language processing and such a security issue poses substantial security risks and erodes trust in artificial intelligence applications among people who use them. …”
Get full text
Article -
2525
A Survey of Post-Quantum Cryptography Migration in Vehicles
Published 2025-01-01“…A promising solution to ensure the continued security attributes of confidentiality, integrity, and availability is the use of Post-Quantum Cryptography (PQC) algorithms. …”
Get full text
Article -
2526
ASSESSING THE QUALITY OF MICROSERVICE AND MONOLITHIC-BASED ARCHITECTURES: A SYSTEMATIC LITERATURE REVIEW
Published 2024-06-01“…The outcome of the literature review brings forth the key quality attributes in addition to their sub-characteristics as follows: performance, scalability, coupling, cohesion, deployment, security, development, complexity, maintainability, and availability. …”
Get full text
Article -
2527
-
2528
Emergency nurses’ disaster preparedness competencies: A focused mapping review and synthesis
Published 2025-01-01“…Conclusion: Communication, incident management, safety and security, preparedness and planning are the most identified integral domains within other identified domains. …”
Get full text
Article -
2529
Migration and Residual Trapping of Immiscible Fluids during Cyclic Injection: Pore-Scale Observation and Quantitative Analysis
Published 2020-01-01“…In GCS operations, residual trapping is the most favorable form of a trapping mechanism because of its storage security and capacity. In this study, the effects of cyclic injection of CO2-water on the immiscible displacement and residual trapping in pore networks were examined. …”
Get full text
Article -
2530
Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices
Published 2025-01-01“…While this expansion drives significant advancements across industries, it also introduces critical challenges in ensuring secure device communication. IoT devices often operate under strict constraints in processing power, memory, and energy consumption, complicating the implementation of robust security measures. …”
Get full text
Article -
2531
Criminological Scenarios of Crime Situation’s Transformation in the Context of Armed Conflict on Donbass in the Midterm
Published 2019-09-01“…The author has expertly substantiated the highest probability of developing a crime situation in the midterm in the following three scenarios: “Stagnation and slight increase” (most realistic), “Control and security” (optimistic), “Turbulent crime” (negative). …”
Get full text
Article -
2532
Overcrowding in prisons: Health and legal implications
Published 2024-01-01“…Beyond the harm caused to persons in prisons, this may negatively impact society at large in terms of security, public health, and economy. Political will is essential in reducing prison overcrowding.…”
Get full text
Article -
2533
The EU Cooperation with South African Countries: Main Trends and Prospects for Development
Published 2024-06-01“…Stronger cooperation can contribute to economic growth, development, peace, and security.…”
Get full text
Article -
2534
An Enhanced LSTM Approach for Detecting IoT-Based DDoS Attacks Using Honeypot Data
Published 2025-02-01“…Abstract One of the widening perils in network security is the Distributed Denial of Service (DDoS) attacks on the Internet of Things (IoT) ecosystem. …”
Get full text
Article -
2535
A New Chaotic Color Image Encryption Algorithm Based on Memristor Model and Random Hybrid Transforms
Published 2025-01-01“…These findings indicate that the SEME-TDHM algorithm successfully encrypts color images, providing strong security and practical utility.…”
Get full text
Article -
2536
Anomaly detection of adversarial cyber attacks on electric vehicle charging stations
Published 2025-03-01“…Intruders pose potential risks to the security, reliability, and functionality of the EVCI, by spoofing the data through these charging ports leading to anomalies in the data. …”
Get full text
Article -
2537
Investigating the blockchain technologies influences on the performance of road freight transportation management systems using network analysis technique
Published 2023-09-01“…The transparency technology has influenced time and trust and security by 22.63% and 77.37%, respectively, and smart contracts affected the two above waste categories by 88.81% and 11.19%, respectively. …”
Get full text
Article -
2538
U.S. plans to internationalize the containment of the USSR in the Balkans in the first half of the 1950s
Published 2020-12-01“…In response, in the early 1950s the United States formed a new security model in the Balkans, which based on a differentiated approach: Greece became a member of NATO, while Yugoslavia entered the anti-Soviet Balkan Pact affiliated with NATO. …”
Get full text
Article -
2539
Nicolai Vasilyevich Ivanov: addition to biography of chekist-transport worker
Published 2020-02-01“…The article deals with the biography reconstruction of the chekist-transport worker (public security officer) N. V. Ivanov. The authors comes to the conclusion that the life and fate of N. …”
Get full text
Article -
2540