Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3261
-
3262
Ukrayna Örneğinden Hareketle Nükleer Silahsızlanmanın Olası Sonuçlarına Dair Bir İnceleme
Published 2020-06-01“…By way of conclusion, it is argued in the context of the 2014 crisis that, denuclearization constitutes a potential national security risk for states (Ukraine) that face formidable nuclear-armed rivals (Russia).…”
Get full text
Article -
3263
School of Energy Diplomacy
Published 2014-10-01“…Russia's cooperation with international community in finding ways of addressing global energy security, serves its national interests on international arena. …”
Get full text
Article -
3264
Why Aceh-Indonesia Conflict Resolution can’t be Copy-Paste in Bangsamoro-Philippines Issue?
Published 2022-06-01“…The main objective is to identify similarities rational choice (survival, security, economy/welfare, prestige, and influence) especially how political elites would still feel enjoy to conduct those agreements in both regions. …”
Get full text
Article -
3265
Analysis and Enhancement of a Password Authentication and Update Scheme Based on Elliptic Curve Cryptography
Published 2014-01-01“…Finally, we compare our enhancement with related works to illustrate that the improvement is more secure and robust, while maintaining low performance cost.…”
Get full text
Article -
3266
Desplazados de Haití: movilidad intrarregional sudamericana y las medidas compulsivas en Brasil y Chile
Published 2020-01-01“…In relation to the procedure to be adopted, it is observed that through qualitative research it will be possible to account for the different representations on the subject under study, without neglecting the quantitative method, as it will contribute to the evaluation and categorization of contained data in government information databases, such as data from the Ministry of Justice and Public Security of Brazil, the National Institute of Statistics and the Judiciary of Chile, and the Institute of Public Policies and Human Rights of Mercosur, with the elaboration of a diagnosis of the displacement of Haitians in South American countries, with special emphasis on the migratory realities of Haitians in Brazil and Chile. …”
Get full text
Article -
3267
Hierarchical Clustering for Anomalous Traffic Conditions Detection in Power Substations
Published 2019-11-01“…For example, in the field of security, several academic works have shown that the same attacks used in computer networks (DoS, Sniffing, Tampering, Spoffing among others), can also compromise the operation of a substation. …”
Get full text
Article -
3268
Analysis of attacks on device manager in software-defined Internet of Things
Published 2017-08-01“…Although being the one that performs one of the most crucial services, the device managers in current primary controllers have a big security issue as they do not include any device verification, authentication, or authorization routines. …”
Get full text
Article -
3269
Zvezda Shipyard Project: Global Implications and Its Influence on the Russian Economy
Published 2024-04-01“…This strategy addresses both socio-economic goals and defense and security challenges. Additionally, the paper provides quantitative analyses of the multiplicative effects generated by the Zvezda Shipyard project's realization.…”
Get full text
Article -
3270
A tensor compression algorithm using Tucker decomposition and dictionary dimensionality reduction
Published 2020-04-01Get full text
Article -
3271
Mobile Music Distribution: A Multichannel Approach
Published 2011-01-01“…The architecture includes a license-based security mechanism that prevents unauthorized usage of digital music, and makes use of an incentive mechanism to stimulate and reward the music distribution among customers. …”
Get full text
Article -
3272
A privacy-preserving collaborative reputation system for mobile crowdsensing
Published 2018-09-01“…We provide a detailed security analysis to prove the effectiveness of privacy-preserving collaborative reputation system against a number of attacks. …”
Get full text
Article -
3273
Application of Multiprotocol Medical Imaging Communications and an Extended DICOM WADO Service in a Teleradiology Architecture
Published 2012-01-01“…The new architecture ensures flexibility in access, user mobility, and enhanced data security.…”
Get full text
Article -
3274
Nature Capital. An ecological transition and open space transformation phenomena
Published 2023-06-01“… As indicated by the UN 2030 Agenda and the new European goals for 2030, Ecological Transition is at the basis of the new development model to reduce polluting emissions, prevent and combat land disruption, minimise the impact of productive activities on the environment and improve the quality of life and environmental security for future generations: on the one hand, orienting an ecological transition towards equity and collective well-being means rethinking the system of relations between man and the natural and built environment and, on the other hand, referring to the construction of social and cultural communities starting from environmental issues and land resources. …”
Get full text
Article -
3275
Entre o lícito e o ilícito: a dinâmica do roubo de cargas e suas zonas cinzentas
Published 2020-01-01“…The Military Intervention in Public Security in Rio de Janeiro, in 2018, expresses this mobilization of economic corporations in government spheres in order to promote a wide-ranging action not only police, but also political. …”
Get full text
Article -
3276
COPING UP WITH CLIMATE CHANGE: A Case Study of a Banten Muslim Community
Published 2024-07-01“…The article argues that the farmers' resilience and agency are crucial for ensuring food security and livelihoods in the face of climate change. …”
Get full text
Article -
3277
PROBLEMS OF TRADE AND ECONOMIC RELATIONS OF WEST AFRICAN COUNTRIES WITH THE EUROPEAN UNION, PROSPECTS FOR THEIR DEVELOPMENT
Published 2020-05-01“…The essence of relationships between West Africa and the European Union based on the papers, both foreign and domestic researchers in the field of security, regional economic development and integration etc. has been disclosed. …”
Get full text
Article -
3278
An Effective Privacy-Preserving Algorithm Based on Logistic Map and Rubik’s Cube Transformation
Published 2014-01-01“…Security and privacy issues present a strong barrier for users to adapt to cloud storage systems. …”
Get full text
Article -
3279
Design and realization of compressor data abnormality safety monitoring and inducement traceability expert system.
Published 2025-01-01“…To promptly monitor abnormal changes in compressor data and trace the causes leading to these data anomalies, this paper proposes a security monitoring and root cause tracing method for compressor data anomalies. …”
Get full text
Article -
3280
A Real-Time Optical Tracking and Measurement Processing System for Flying Targets
Published 2014-01-01“…The system can be used in the field of aerospace tests like target analysis including dynamic parameter, transient states, and optical physics characteristics, with security control.…”
Get full text
Article