Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
621
Creating and Implementing an Effective and Deterrent National Cyber Security Strategy
Published 2020-01-01“…This paper presents a new national cyber security strategy (NCSS) covering the deterrence perspective from creation to implementation. …”
Get full text
Article -
622
Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks
Published 2013-01-01“…Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'…”
Get full text
Article -
623
The Role of Basic Infrastructure to Strengthen Economic Security in Eastern Indonesia
Published 2024-08-01“…Increasing agricultural productivity has positive implications for Indonesia's food and economic security. Investment in water infrastructure development is needed to support leading sectors.…”
Get full text
Article -
624
A Critical Review of A New Framework for Analysis of Security
Published 2018-01-01Subjects: “…security…”
Get full text
Article -
625
Virtual Cloud Laboratories in Training of Specialists of the Direction “Computer Security”
Published 2015-12-01Get full text
Article -
626
Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services
Published 2014-01-01“…We also show how the security weaknesses of He et al.’s scheme can be addressed without degrading the efficiency of the scheme.…”
Get full text
Article -
627
INFORMATION SECURITY CONTROLS AS DETERMINANT OF CONTINUITY OF INFORMATION SYSTEM WORK
Published 2017-11-01Subjects: “…information security…”
Get full text
Article -
628
Quantitative method for network security situation based on attack prediction
Published 2017-10-01Subjects: Get full text
Article -
629
INFORMATION SECURITY CONTROLS AS DETERMINANT OF CONTINUITY OF INFORMATION SYSTEM WORK
Published 2017-11-01Subjects: “…information security…”
Get full text
Article -
630
Adaptively secure key-policy ABE scheme with fast decryption
Published 2014-11-01Subjects: Get full text
Article -
631
Detection of Illegal Movement in Radioactive Material Transportation Security Systems
Published 2021-01-01Get full text
Article -
632
NIGERIAN YOUTH UNEMPLOYMENT AND SECURITY ISSUES: EVALUATING THE ENTREPRENEURSHIP OPTION
Published 2024-05-01Subjects: “…Security Challenger…”
Get full text
Article -
633
Scaling up Sustainable Agriculture and Food Security With Nanoscience and Technology
Published 2024-12-01Subjects: “…food security…”
Get full text
Article -
634
Secure Bootstrapping and Rebootstrapping for Resource-Constrained Thing in Internet of Things
Published 2015-08-01“…In Internet of Things, secure key establishment and building trust relationship between the thing and the home gateway (or the controller) in home network or Body Area Network are extremely important. …”
Get full text
Article -
635
The Security of Student Information Management System Based upon Blockchain
Published 2022-01-01“…This article aims to study the security of the student information management system based on the blockchain. …”
Get full text
Article -
636
Environmental and Socio-Political Security Risks Correlation in Mountainous Areas
Published 2025-01-01Subjects: Get full text
Article -
637
Literature Review of Machine Learning and Threat Intelligence in Cloud Security
Published 2025-01-01Subjects: Get full text
Article -
638
SPECIFICS TAIL RISKS THAT THREATEN ECONOMIC SECURITY OF INDUSTRIAL ORGANIZATIONS
Published 2017-02-01Subjects: Get full text
Article -
639
Ritual as mechanism for securing life and averting evil among the Krobo
Published 2008-06-01“…Two of the many functions of rituals are to secure blessings from the deity or to ward off evil. …”
Get full text
Article -
640
Security risk analysis of power 5G hybrid networking
Published 2022-01-01Subjects: Get full text
Article