Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
601
Overview of the data security and privacy-preserving of mobile cloud services
Published 2013-12-01Subjects: Get full text
Article -
602
Architecture and practice of BGP internet routing visibility and security detection
Published 2021-12-01Subjects: Get full text
Article -
603
UC secure one-time signature based broadcast authentication
Published 2010-01-01Subjects: “…network security…”
Get full text
Article -
604
Application of convolutional neural networks in the intelligence security system subsystem
Published 2020-08-01“…The article proposes the structure of an integrated security system for areal facilities. The main subsystems included in its composition are considered. …”
Get full text
Article -
605
Small Arms and Small Countries: Firearms and the International Security Agenda
Published 2016-05-01“…This article examines the emergence of the small arms trade on the international political agenda as a growing security threat. Employing the theoretical framework proposed by the Copenhagen School, this article argues that the issue of small arms gained traction at the international level in the context of the post-Cold War. …”
Get full text
Article -
606
Container Security Device Chain Network for Safe Railway Transportation
Published 2014-11-01“…This paper suggests the use of the container security devices (CSDs), which has been adopted for the marine transportation so far, to enhance the security of railway freight transportation. …”
Get full text
Article -
607
Qualitative analysis of it reliability and security in local government financial reporting
Published 2024-12-01Subjects: Get full text
Article -
608
THE ESSENCE AND COMPONENTS OF THREATS TO THE ECONOMIC SECURITY OF HIGHER EDUCATION INSTITUTIONS
Published 2025-01-01Subjects: Get full text
Article -
609
Embedded software security testing technology for relay protection devices
Published 2018-04-01“…As the first defensive line of power grid security,the right actions of delay protection devices can minimize the influence to the electric power system security caused by system or equipment failures.Based on the research of relay protection device inspection procedures and enterprise standard of electric power industry,the embedded software testing content and technologies of relay protection device were studied,including functional testing,performance testing and fault injection testing.This research contributes to the completeness and correctness of the embedded software testing about relay protection device.…”
Get full text
Article -
610
Dependability and Security for Wireless Ad Hoc and Sensor Networks and Their Applications
Published 2013-07-01Get full text
Article -
611
Study on security routing algorithm based on dynamic adjacent trust
Published 2013-06-01Subjects: Get full text
Article -
612
Fairtrade, Food Security and Globalization: Building Alternative Food Systems
Published 2016-05-01Subjects: Get full text
Article -
613
New signcryption algorithm for secure communication of ad hoc networks
Published 2010-01-01Subjects: Get full text
Article -
614
Design of security verification platform for the integrated space-ground network
Published 2016-08-01Subjects: Get full text
Article -
615
A mutual authentication security scheme for mobile NFC devices
Published 2017-08-01Subjects: Get full text
Article -
616
Security mechanism in access control based on non-cooperative game
Published 2014-11-01“…Access control technology is an important information security technology to protect the sensitive information and critical resources in computer system and network.But traditional access control methods could only respond to access requests of users passively and can’t meet the changing dynamic network environment.In order to improve the ability to respond to malicious attacks and threats in access control system,a security mechanism is designed,which is suitable for access control,based on non-cooperative game theory in the game.When the subject makes an access request to the object,there will be a non-cooperative game between them to get Nash equilibrium.Then the security mechanism will compare the probabilities in the Nash equilibrium to the setting thresholds to get the conclusion that whether to authorize the subject or not.Experiment proves the effectiveness of the security mechanisms.…”
Get full text
Article -
617
THE RISE OF ETHNIC MILITIA, BANDITRY AND IMPLICATION ON NATIONAL SECURITY IN NIGERIA
Published 2022-05-01Subjects: Get full text
Article -
618
New chameleon Hashing of secure and privacy-preserving vehicular communications
Published 2014-11-01Subjects: “…secure and privacy-preserving…”
Get full text
Article -
619
Neighbourhood, crime and fear: Exploring subjective perception of security in Serbia
Published 2025-01-01Subjects: “…security…”
Get full text
Article -
620
Cooperative secure transmission against collusive eavesdroppers in Internet of Things
Published 2020-06-01“…As Internet of Things (IoT) has boomed in recent years, many security issues have also been exposed. Focusing on physical layer security in wireless Internet of Things network communication, a series of security methods have been widely studied. …”
Get full text
Article