Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2801
-
2802
Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks
Published 2024-01-01“…Based on our thorough analysis, we identify key limitations in current methodologies and propose potential paths for future research, focusing on integrating real-time data analysis, cross-layer security measures, and collaborative IDS frameworks.…”
Get full text
Article -
2803
Design a Robust DDoS Attack Detection and Mitigation Scheme in SDN-Edge-IoT by Leveraging Machine Learning
Published 2025-01-01“…However, the complexity of IoT networks, with their resource-constrained devices, presents substantial security challenges, particularly Distributed Denial of Service (DDoS) attacks. …”
Get full text
Article -
2804
Permanent aquifer storage loss from long-term groundwater withdrawal: A case study of subsidence in Bandung (Indonesia)
Published 2025-02-01“…Our study is one of the first examples of using satellite data with geomechanical models to constrain groundwater extraction rates and emphasises the importance of remote sensing data in groundwater resource management, and the irreversible impact of unsustainable groundwater extraction, which has implications for long term water security. New Hydrological Insights for the Region: The study found that continued industrial groundwater extraction has resulted in permanent aquifer storage loss, with significant implications for long-term water security. …”
Get full text
Article -
2805
Multi‐objective multiperiod stable environmental economic power dispatch considering probabilistic wind and solar PV generation
Published 2024-12-01“…Abstract The economic‐environmental power dispatch (EEPD) problem, a widely studied bi‐objective non‐linear optimization challenge in power systems, traditionally focuses on the economic dispatch of thermal generators without considering network security constraints. However, environmental sustainability necessitates reducing emissions and increasing the penetration of renewable energy sources (RES) into the electrical grid. …”
Get full text
Article -
2806
-
2807
Dynamic Key Replacement Mechanism for Lightweight Internet of Things Microcontrollers to Resist Side-Channel Attacks
Published 2025-01-01“…The lightweight D-H key exchange ensures that even resource-constrained IoT devices can securely perform key exchanges without significant computational overhead. …”
Get full text
Article -
2808
-
2809
The U.S. Assistance to the MENA Arab Countries under the Trump Administration: The Logic of a Diff erentiated Approach
Published 2020-12-01“…The assistance to Cairo and Amman is ringfenced and protected, while aid to other recipients, including security assistance and FMF grants, is prone to quite drastic cuts. …”
Get full text
Article -
2810
-
2811
Occult hepatitis B virus infection: risk for a blood supply, but how about individuals’ health?
Published 2025-03-01Get full text
Article -
2812
Financial Innovations and Financial Inclusion Among Commercial Banks in Uganda: Case Study Of Kabale District.
Published 2023“…As more clients choose mobile banking, the report advises banking institutions to develop measures to improve security in the platform. The report also advises making these platforms straightforward and simple to use in order to attract more users to the business. …”
Get full text
Thesis -
2813
The Contribution of Micro Finance Institutions on the Growth of Small and Medium Business : A Case Study of North Kigezi Diocese Sacco In Rukungiri Municipality.
Published 2023“…Findings from the study established that the requirements for accessing credit services from North Kigezi SACCO by small-scale enterprises include; collateral security, being an active member, Local Council letter, and having guarantor, among other requirements. …”
Get full text
Thesis -
2814
Development theory and practice in a changing world /
Published 2019Table of Contents: “…-- The role of the state : "developmental states", geopolitics, industrialisation, and security -- Deconstructing development : postmodernism and decoloniality -- Aid, development and South-South cooperation? …”
View in OPAC
Electronic eBook -
2815
Survey on Byzantine attacks and defenses in federated learning
Published 2024-12-01“…Secondly, guided by the classic network security defense model, federated learning defense methods were classified and analyzed from the perspective of defense mechanisms. …”
Get full text
Article -
2816
Floridians’ Perceptions of GMOs: GMOs and Florida Citrus
Published 2014-10-01“… Worldwide and in Florida, food-related issues such as food safety, food security, and use of new food technologies continue to be top concerns. …”
Get full text
Article -
2817
Application of fuzzy modeling in the evaluation of crisis state of enterprises
Published 2019-04-01“…In the model of a fuzzy assessment of the crisis state of enterprises, the following input linguistic variables have been highlighted: the relative level of financial status, the probability of bankruptcy, the level of information security, the level of innovation potential. The terms of the input variables and the result variable have been described. …”
Get full text
Article -
2818
The New Trend in the EU’s Migration Policy: Is Externalization Any Better?
Published 2024-12-01“… The highly dynamic security environment, characterized by numerous disturbances such as armed conflicts, civil wars, and political and social instability in various parts of the world, has led millions of people to flee their countries of origin – as of 2023, this number is 117,3 million. …”
Get full text
Article -
2819
Decision-Making under Pillars Two and Three
Published 2009-12-01“…The second pillar is connected with Common Foreign and Security Policy, while the third pillar contributes with Justice and Home Affairs. …”
Get full text
Article -
2820
Comme une aiguille sur un sillon d’asphalte
Published 2021-12-01“…Through his work with skateboarders in Tokyo, the author shows how the search for spots - places that are good for skating - and the observation of security measures transform the skaters' perception of their environment. …”
Get full text
Article