Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
801
BSAMS: Blockchain-Based Secure Authentication Scheme in Meteorological Systems
Published 2023-03-01Subjects: Get full text
Article -
802
Fast anomalous traffic detection system for secure vehicular communications
Published 2024-12-01“…Despite its ubiquitous use, the CAN protocol lacks critical security features, making vehicle communications vulnerable to message injection attacks. …”
Get full text
Article -
803
Space-Terrestrial Integrated Multi-Identifier Network with Endogenous Security
Published 2020-12-01Subjects: Get full text
Article -
804
A Resilience-Based Security Assessment Approach for CBTC Systems
Published 2021-01-01“…The CBTC system ensures safe and efficient operation of trains, so the quantitative assessment of cyber security is quite necessary. In this paper, a resilience-based assessment method is proposed to analyze the security level of CBTC systems based on indicators of both the cyber domain and the physical domain. …”
Get full text
Article -
805
The role of financial analysis in ensuring economic security of agricultural enterprise
Published 2022-03-01Subjects: Get full text
Article -
806
Network security situation evaluation method for multi-step attack
Published 2017-01-01Subjects: Get full text
Article -
807
An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment
Published 2015-01-01“…Since the data needs to be secured throughout its life cycle, security of the data in cloud is a major challenge to be concentrated on because the data is in third party’s premises. …”
Get full text
Article -
808
Demographic crisis as a threat to the national security of the Russian Federation
Published 2012-10-01Subjects: Get full text
Article -
809
Secure network coding method merged with timestamp and homomorphic signature
Published 2013-04-01“…A secure network coding method merged with timestamp and homomorphic signature which can solve security issues in wireless multi-hop networks was proposed.The timestamp into RSA-based homomorphic signature scheme was brought and used to produce random coefficients of net it possible to defend pollution attacks and replay attacks simultaneously while maintaining the homomorphic property of the signature.The analysis that mainly focus on was the influence of random coefficients on decoding probability of network coding a security of the proposed scheme.Results indicate that the proposed scheme can defend pollution attacks and replay attacks simultaneously,and the ratio of overhead between RSA-based homomorphic signature scheme and the proposed scheme is approximates 1.…”
Get full text
Article -
810
Shaping the future of commercial quantum computer and the challenge for information security
Published 2016-03-01“…The modern cryptography still has strong security. Take the quantum devices constraints into consideration was proposed for the first time, the storage of former registers in the Shor algorithm should be 100 or less Qubits theoretically decreased from 1 000 or more Qubits. …”
Get full text
Article -
811
SECURITY OF LIVES, RIGHTS TO PEACEFUL ASSEMBLY AND THE ENDSARS PROTEST IN NIGERIA
Published 2023-07-01Subjects: “…Human Security…”
Get full text
Article -
812
The Role of the United Nations Security Council in the Protection of Cultural Heritage
Published 2024-09-01Subjects: Get full text
Article -
813
Verification of serialising instructions for security against transient execution attacks
Published 2023-07-01“…However, errors and Trojans in the hardware implementation of lfence can be exploited to compromise the software mitigations that use lfence. The aforementioned security gap has not been identified and addressed previously. …”
Get full text
Article -
814
Research on bionic mechanism based endogenous security defense system
Published 2021-02-01Subjects: “…endogenous security…”
Get full text
Article -
815
THE U.S. NATIONAL SECURITY COUNCIL IN CONTEMPORARY AMERICAN INTERNATIONAL STUDIES
Published 2016-08-01Subjects: Get full text
Article -
816
Aggregation Scheme with Secure Hierarchical Clustering for Wireless Sensor Networks
Published 2012-07-01“…Due to our IP naming rules and type 1 nodes as cluster heads, public key cryptography, such as RSA (Rivest, Shamir, Adleman), or ECC (Elliptic Curve Cryptosystem), is easily implanted to our system to strengthen our security. The sink node is the only certification authority in our system, but n level cluster heads can be extended to n level certification authorities if needed, where n is maximum number of level.…”
Get full text
Article -
817
-
818
Data recommendation algorithm of network security event based on knowledge graph
Published 2023-12-01Subjects: Get full text
Article -
819
RETRACTED: New technologies for the creation of an automatic security and fire alarm system
Published 2024-01-01Get full text
Article -
820
Enhancing Security in International Data Spaces: A STRIDE Framework Approach
Published 2024-12-01“…Regulatory and technological frameworks such as International Data Spaces (IDS) have been developed to facilitate secure data exchange while integrating security and data sovereignty aspects required by laws and regulations, such as the GDPR and NIS2. …”
Get full text
Article