Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
501
Protocol security enhancement on secondary system of smart substation
Published 2015-12-01Subjects: Get full text
Article -
502
Architecture and mechanisms for secure and efficient internetworking of heterogeneous network
Published 2022-04-01Subjects: Get full text
Article -
503
Managing economic climate security: theoretical and applied aspects
Published 2022-01-01“…The article proposes to consider climate security as an important factor in the sustainable development of the economy. …”
Get full text
Article -
504
Benelux countries’ security strategies: between europeanism and atlanticism
Published 2024-08-01“…In the article, transformation of the foreign policy and security strategies of the Benelux countries – Belgium, the Netherlands and Luxembourg – is analyzed against the exacerbating conflict in Ukraine. …”
Get full text
Article -
505
Implementation architecture of mimic security defense based on SDN
Published 2017-10-01Subjects: “…mimic security defense…”
Get full text
Article -
506
Heterogeneous Expectations and Speculative Behavior in Insurance-Linked Securities
Published 2015-01-01“…Within the framework of heterogeneous agent models, this paper analyzes the impact factors on the issuance of an insurance-linked security (ILS), and gives an ILS pricing formula and the conditions of existence and stability of the issue price. …”
Get full text
Article -
507
Research of eMBMS's Security Mechanism and Content Protection
Published 2014-12-01Subjects: Get full text
Article -
508
Rational-security and fair two-party comparison protocol
Published 2023-12-01Subjects: “…secure comparison…”
Get full text
Article -
509
Innovative resource-saving security strategies for IoT devices
Published 2025-01-01“…Emphasis is placed on developing adaptive security mechanisms that can effectively respond to dynamic operational conditions and resource constraints. …”
Get full text
Article -
510
Analisis Burnout Programmer Terhadap Penerapan Secure Coding
Published 2024-08-01Subjects: Get full text
Article -
511
Host security assessment method based on attack graph
Published 2022-02-01Subjects: “…host security…”
Get full text
Article -
512
ECONOMIC SECURITY OF A TECHNICAL UNIVERSITY: CONCEPTUAL BASES
Published 2016-12-01Subjects: Get full text
Article -
513
Reverse teaching design of curriculum ideological and political in information security major—Take the wireless communication network security course of Xidian University as an example
Published 2021-06-01Subjects: “…information security…”
Get full text
Article -
514
THE ANALYSIS OF DAHIYA DOCTRINE IN THE CONTEXT OF ISRAEL’S FURTHER SECURITY CLAIM
Published 2018-06-01Subjects: Get full text
Article -
515
Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation
Published 2014-01-01“…We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. …”
Get full text
Article -
516
Translocality, Remittances, and Food Security in the Ghana-Qatar Migration Corridor
Published 2025-01-01“…The findings reveal that cash remittances play a crucial role in enhancing food security and the overall welfare of households in Ghana. …”
Get full text
Article -
517
Behavior-oriented inside network security situation modeling and analysis
Published 2016-08-01Subjects: Get full text
Article -
518
Host security threat analysis approach for network dynamic defense
Published 2018-04-01Subjects: “…cyber security…”
Get full text
Article -
519
Secure IoT data dissemination with blockchain and transfer learning techniques
Published 2025-01-01“…However, most existing systems for storing and disseminating IoT data streams lack reliability, security, and transparency, primarily due to centralized architectures that create single points of failure. …”
Get full text
Article -
520
The Analysis of Conformity of Proliferation Security Initiative Rules with International Law
Published 2021-01-01Subjects: “…security council…”
Get full text
Article