Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
321
Study on the 5GC security situational awareness system
Published 2022-11-01Subjects: Get full text
Article -
322
Security analysis in heterogeneous fault-tolerant control plane
Published 2018-11-01“…With the large-scale application of software-defined networks,the security of software-defined networks becomes more and more important.As an important defense idea,the fault-tolerant control plane based on heterogeneity has attracted more and more researchers' attention in recent years.However,the existing researches ignore the problem of common vulnerability in heterogeneous variants,which greatly reduces the security benefits of the fault-tolerant control architecture for software-defined networks.Addressing this problem,the common vulnerability was taken in heterogeneous variants into considerations.First,the tolerance capability of the fault-tolerant control plane was quantified.Then a control plane deployment method was constructed which was able to maximize the tolerance capability.The simulations show that the proposed method can effectively reduce the failure probability of the control plane.When the attackers attack the control plane constructed based on the proposed method,they pay more attack cost to compromise the control plane.…”
Get full text
Article -
323
Parents' Postnatal Sense of Security: A Concept Analysis
Published 2024-12-01Subjects: Get full text
Article -
324
Community Food Security and Florida Cooperative Extension Service
Published 2007-07-01“…Swisher, defines community food security and identifies its importance for extension agents in Florida. …”
Get full text
Article -
325
RETRACTED: Approaches to quantifying the conditions of national financial security
Published 2024-01-01Get full text
Article -
326
Lightweight and secure search scheme for medical data sharing
Published 2024-11-01Subjects: Get full text
Article -
327
Method Framework for Developing Enterprise Architecture Security Principles
Published 2019-10-01Subjects: Get full text
Article -
328
TCCL:secure and efficient development of desktop cloud structure
Published 2017-10-01Subjects: Get full text
Article -
329
Political and security reflections of Albanian terrorism on the Republic of Serbia
Published 2024-01-01Subjects: Get full text
Article -
330
Security evaluation method for confidential and stable complex systems
Published 2019-04-01Subjects: Get full text
Article -
331
Heterogeneous redundancies scheduling algorithm for mimic security defense
Published 2018-07-01Subjects: “…mimic security defense…”
Get full text
Article -
332
Correction: A lightweight and secure protocol for teleworking environment
Published 2024-01-01Get full text
Article -
333
Equipment network management security of electrical power PTN
Published 2015-12-01Subjects: Get full text
Article -
334
«Human Security»: Concept, Political Discourse, and Ways of Implimintation
Published 2010-12-01“…На фоне существования множес- тва трактовок human security наиболее адекватно её смысл передаёт термин безопасность личности. …”
Get full text
Article -
335
Security monitoring system of intelligent substation based on IoT
Published 2018-09-01Subjects: Get full text
Article -
336
Security signaling optimization in optical network for smart substation
Published 2019-02-01Subjects: Get full text
Article -
337
Provably secure social network privacy-preserving scheme
Published 2016-08-01Subjects: “…provable secure…”
Get full text
Article -
338
Secure Localization in Wireless Sensor Networks with Mobile Beacons
Published 2012-10-01“…We present a scheme, called SLMB, for secure sensor localization in WSNs in which we propose to use a mobile beacon node with the goal of reducing the overall energy consumption in sensor nodes during sensor localization. …”
Get full text
Article -
339
Securing Cloud-Based Internet of Things: Challenges and Mitigations
Published 2024-12-01Subjects: Get full text
Article -
340
THE PERSPECTIVES OF INTERNATIONAL REGULATION OF PRIVATE MILITARY AND SECURITY COMPANIES’
Published 2016-04-01Subjects: “…private military and security companies…”
Get full text
Article