Showing 461 - 480 results of 9,720 for search '"security"', query time: 0.08s Refine Results
  1. 461
  2. 462
  3. 463
  4. 464
  5. 465

    Framework for Secure Wireless Communication in Wireless Sensor Networks by Muhammad Usama, Fahad T. Bin Muhaya

    Published 2013-12-01
    “…With large-scale and rapid development in wireless sensor networks (WSNs), there is great demand to adopt security mechanisms for secure wireless communication. …”
    Get full text
    Article
  6. 466
  7. 467
  8. 468

    Securing Bird Feeders from Florida Black Bears by Ethan T. Noel, Elizabeth F. Pienaar

    Published 2017-05-01
    “…This 3-page fact sheet explains how to secure bird seed from bears so that they don’t become reliant on human food sources, a condition that puts them at greater risk of being killed from vehicle collisions, illegal shooting, or euthanasia. …”
    Get full text
    Article
  9. 469
  10. 470

    European Union (EU) Information Security Policies Türkay by Türkay Henkoğlu, Bülent Yılmaz

    Published 2013-11-01
    “…The importance and scope of these policies were examined based on the McCumber information security model, which is a comprehensive and multidimensional information security model. …”
    Get full text
    Article
  11. 471

    Development of multi-agent information security management system by I. P. Khavina, Yu. V. Hnusov, O. O. Mozhaiev

    Published 2022-12-01
    Subjects: “…information security management systems…”
    Get full text
    Article
  12. 472

    Survey on RDMA protocol applications and security protection technologies by LIU Yumeng, TANG Zhengliang, LU Songfeng, ZHU Jianxin, LIU Yunqu

    Published 2024-04-01
    “…The security risks faced by RDMA applications in relevant scenarios were investigated, and a summary of the research progress in the RDMA security field over recent years was provided. …”
    Get full text
    Article
  13. 473
  14. 474

    Future of European Security Policies: Is Geopolitical Europe Possible? by Ahmet K. Han, Çiğdem Üstün

    Published 2024-03-01
    “…Since the aftermath of World War II, the pursuit of European autonomy in ensuring its security began with the 1950s French proposal for a pan-European defense force, though never realized. …”
    Get full text
    Article
  15. 475
  16. 476
  17. 477
  18. 478

    Information security of the region: Approaches to consideration and economic essence by Liubov Kovalska, Volodymyr Topalov, Roman Topalov

    Published 2023-05-01
    Subjects: “…information; information resources; information security; information technologies; threat; danger…”
    Get full text
    Article
  19. 479

    Research on Security Connotation and Response Strategies for Big Data by Kun Hu, Di Liu, Minghui Liu

    Published 2014-02-01
    Subjects: “…ig data security…”
    Get full text
    Article
  20. 480

    The Strategic Measures for the Industrial Security of Small and Medium Business by Chang-Moo Lee

    Published 2014-01-01
    “…The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. …”
    Get full text
    Article