Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3041
RETRACTED: Parallel Encryption With Digit Arithmetic Of Covertext Model Using Duplicated Covertext
Published 2022-12-01“…Cryptography and steganography techniques have an important role in securing information. Parallel Encryption with Digit Arithmetic of Covertext (PDAC) encryption model adopts cryptography and steganography for securing messages. …”
Get full text
Article -
3042
A Survey of Artificial Immune System Based Intrusion Detection
Published 2014-01-01“…In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. …”
Get full text
Article -
3043
A Color-Image Encryption Scheme Using a 2D Chaotic System and DNA Coding
Published 2019-01-01“…This paper proposes a method of encrypting images with password protection for secure sharing based on deoxyribonucleic acid (DNA) sequence operations and the tangent-delay ellipse reflecting the cavity-map system (TD-ERCS). …”
Get full text
Article -
3044
-
3045
Living the liquid life: Gender, precarity, and journalism in the post-#metoo era
Published 2024-09-01“…Increasing demands for flexibility have institutionalised temporary contracts, eroded job security, and expanded job precarity, with women and young journalists disproportionately affected. …”
Get full text
Article -
3046
CMAIS-WOA: An Improved WOA with Chaotic Mapping and Adaptive Iterative Strategy
Published 2023-01-01Get full text
Article -
3047
The Design Blueprint for a Large-Scale Telehealth Platform
Published 2022-01-01“…This design blueprint covers the digital healthcare ecosystem, new patient journey design for digital health services, telehealth functionality design, and an outline of the platform infrastructure and security design. Ultimately, telehealth platforms establish a completed digital healthcare service and new ecosystem that provides better care for every patient worldwide.…”
Get full text
Article -
3048
Postfazione. La fragilità della sovranità tra colonialismi ed epistemologie dei sud del mondo
Published 2024-06-01“…The contribution aims to highlight dynamics and processes that are common to the articles in the monographic dossier, dedicated to food sovereignty, security and sustainability in different island contexts. …”
Get full text
Article -
3049
Factors Affecting Cloud-Based Accounting Adoption in the Indonesian Banking Sector
Published 2025-01-01“…In contrast, technological and environmental factors must be considered by banks and the Indonesian government, especially clarity regarding data security protection from cloud adoption to provide confidence to users of cloud-based accounting applications.…”
Get full text
Article -
3050
Disappearance of women and girls in Mexico: Contributions of feminisms for understanding macrosocial processes
Published 2020-05-01“…This re-search argues that the increase in disappeared girls is associated with two main factors: an economy of dispossession of human lives for the accumulation of capital, which produces specific forms of violence against women and girls, and a systematic violence against women exercised by agents from state security and legal institutions.…”
Get full text
Article -
3051
THE RELATIONSHIP BETWEEN ECONOMIC GROWTH AND MIGRATION IN TERMS OF 14 EUROPEAN UNION COUNTRIES AND TURKEY
Published 2022-12-01“…The literature on migration is often studied in the economic, political and security fields. This study focuses on the relationship of migration with economic growth. …”
Get full text
Article -
3052
PENERAPAN ARTIFICIAL INTELLIGENCE (AI) DALAM PERAMALAN AKUNTANSI TINJAUAN LITERATUR DAN AGENDA PENELITIAN MASA DEPAN
Published 2025-01-01“…Major implementation challenges include data quality, infrastructure limitations, and data security. Development opportunities are identified in blockchain integration, hybrid models, and preprocessing automation. …”
Get full text
Article -
3053
Using the Ethereum Blockchain in the Internet of Things Network for IT Diagnostics
Published 2024-09-01“…This system ensures efficient, secure and transparent data processing, optimizing the processes of data registration, authorization and verification. …”
Get full text
Article -
3054
Research on Sarcastic Emotion Recognition Based on Multiple Feature Fusion
Published 2025-01-01Get full text
Article -
3055
EAP-Swift: An Efficient Authentication and Key Generation Mechanism for Resource Constrained WSNs
Published 2015-04-01“…Finally, the protocol was verified in terms of security using the AVISPA tool.…”
Get full text
Article -
3056
Spanish refugees in Portugal and the Portuguese solidarity (1936-1945)
Published 2024-12-01“…Due to its authoritarian nature, Salazar´s regime proved reluctant to receive them and developed a repression directed at these refugees, considered “undesirable,” visible in the increase of the number of border posts and their reinforcement and in the collaboration between different authorities, namely PVDE (State Surveillance and Defense Police), GNR (Republican National Guard), PSP (Public Security Police) and GF (Fiscal Guard), leading to their concentration in large national prisons. …”
Get full text
Article -
3057
-
3058
Influencing Factors Analysis on Land-Lost Farmers’ Happiness Based on the Rough DEMATEL Method
Published 2020-01-01“…The government can improve the social environment policies, such as land acquisition, social security, and employment to influence other factors and improve the level of happiness of land-losing farmers. …”
Get full text
Article -
3059
Toward Safer E-Commerce Transactions: The Influence of System Quality, Information Accuracy, and Government Oversight
Published 2024-12-01“…To improve public knowledge about transaction security in e-commerce, thorough socialization and education are needed, targeting all parties involved in online transactions, including marketplaces, payment providers, and delivery services. …”
Get full text
Article -
3060
Mathematical Modeling of Static Data Attribute Encryption Based on Big Data Technology
Published 2022-01-01“…In order to improve the attributes of static data, encryption technology can provide a reliable technical guarantee for network security. This paper presents a mathematical modeling method of static data attribute encryption based on big data technology. …”
Get full text
Article