Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
821
Wi-Fi security evaluation model based on BP neural network
Published 2016-10-01Subjects: Get full text
Article -
822
Key technology and application of intelligent connected patrol vehicles for security scenario
Published 2020-04-01“…Practical applications combined with industry scene is a common problem in the present artificial intelligence technology.Facing the security application scenario,the practice landing of unmanned technology -- intelligent connected patrol vehicle was studied.Integrating different sensors such as camera,LiDAR,inertial navigation system (INS),etc,the awareness system can accurately identify the platform itself,road conditions and target behavior using key technology such as artificial intelligence (AI),data fusion.Combining human intelligence (HI) in scene cognition of human experience and artificial intelligence (AI) in cognition of computing,a hybrid intelligent cognitive system using to security scene was built.Based on human in the loop system architecture and technology such as 5G ,vehicle to everything (V2X),edge computing,etc,different interactions between human ,machine and environment were designed,which ensured the safe and reliable operation of the system and increased the work efficiency by a wide margin.…”
Get full text
Article -
823
Enhanced Lightweight Quantum Key Distribution Protocol for Improved Efficiency and Security
Published 2025-01-01“…Quantum Key Distribution (QKD) provides secure communication by leveraging quantum mechanics, with the BB84 protocol being one of its most widely adopted implementations. …”
Get full text
Article -
824
Research on LoRa network security schemes based on RF fingerprint
Published 2021-12-01Subjects: Get full text
Article -
825
A Security Authentication Protocol for Trusted Domains in an Autonomous Decentralized System
Published 2016-03-01“…By applying BAN predicate logic and AVISPA security analysis tool of network interaction protocol, we can guarantee protocol security and provide complete safety tests. …”
Get full text
Article -
826
An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security
Published 2023-09-01“…However, IIoT involves some security vulnerabilities that are more damaging than those of IoT. …”
Get full text
Article -
827
Crop Diversification for Ensuring Sustainable Agriculture, Risk Management and Food Security
Published 2025-02-01Subjects: Get full text
Article -
828
Adjusted automata learning algorithm for security protocol adaptive model checking
Published 2015-11-01Subjects: “…security protocol…”
Get full text
Article -
829
Task scheduling optimization strategy for roadside unit based on security strength
Published 2024-04-01Subjects: Get full text
Article -
830
Secure outsource computing scheme of modular exponentiation based on single server
Published 2018-01-01“…At present,in discrete-log based cryptographic protocols,most of the computational models of modular exponentiation are for primes,while less work has been done for composite.What’s more,most schemes are based on two servers,in which it requires at least one server to be honest.However,there may not be a fully trusted cloud server in the actual environment.Then a new secure method for outsourcing exponentiation modular a composite which based on a single server was proposed.The scheme used a new mathematical division method,it could ensure the privacy of the base and exponentiation.Compared with the existing schemes,the checkability of our scheme can be greatly improved.The user can detect the error result with the probability of 119/120.…”
Get full text
Article -
831
Problems of the Use of Private Military and Security Companies in the US military operations
Published 2010-06-01Get full text
Article -
832
Data update algorithm based on secure network coding in cloud environment
Published 2017-05-01“…In the cloud environment for data storage,the use of secure network coding technology can be a good solution to the data privacy and reliability issues.However,each coding block usually has a high correlation after network coding,very few updates to the file need to be re-encoded which is extremely easy to cause information leakage and serious consumption of system resources.To solve this problem,a network coding cloud storage data updating algorithm was proposed.Just by sending files change difference matrix,the storage node could update parts of the coding block accordingly which could complete the entire update files.Experimental results show that compared with RS coding and Tornado coding,the algorithm can not only ensure data security,but also greatly improve the efficiency of data update and data reconstruction.…”
Get full text
Article -
833
Lightweight authentication protocol for security vehicle network of railway freight train
Published 2018-11-01Subjects: Get full text
Article -
834
Climate change, economic security, and macroeconomic stability: Insights from the EU
Published 2025-01-01“…This research examines the impact of climate change risks on the macroeconomic situation and the security of the economic system in the EU-27 during the 2002-2020 period. …”
Get full text
Article -
835
A blockchain-based secure path planning in UAVs communication network
Published 2025-02-01Subjects: Get full text
Article -
836
TRANS-BORDER TRAJECTORIES AND HUMAN SECURITY IN NIGERIA: NORTHEAST AND NORTHWEST IN PERSPECTIVE
Published 2023-12-01Subjects: Get full text
Article -
837
The Russian Federation subjects budgets as a financial basis for their economic security
Published 2022-11-01Subjects: Get full text
Article -
838
Secure Pesticide Storage: Essential Structural Features of a Storage Building
Published 2004-10-01Get full text
Article -
839
Endogenous Security for the Space-Integrated-Ground Information Network in 6G
Published 2023-06-01Subjects: “…cyberspace endogenous security…”
Get full text
Article -
840
Discussion on Key Issue of Batch Testing About the Security of Mobile Application
Published 2014-12-01Subjects: “…security of mobile application…”
Get full text
Article