Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8681
A comparative study of dynamic risk spillovers among financial sectors in China before and after the epidemic.
Published 2024-01-01“…This paper takes the unexpected event of the new coronavirus as the research background, selects the daily closing price data of the financial sectors (banking, insurance, securities, and multifinance) from 20 June 2017 to 31 December 2023. …”
Get full text
Article -
8682
Cross-Border Printing Privileges in the Seventeenth-Century Low Countries
Published 2024-12-01“…Rather than seeing these cross-border privileges solely as a way for printers to expand the reach and commercial viability of their published works, this article demonstrates that, by securing privileges from multiple authorities, printers showed they were able to navigate the market for institutions and complex networks of power. …”
Get full text
Article -
8683
Time synchronization attack detection for industrial wireless network
Published 2023-06-01“…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
Get full text
Article -
8684
What determines investment in the Nippon Individual Savings Account? an investigation of Japan's tax-exempt investment account.
Published 2025-01-01“…Taking advantage of the launch of the revamped NISA, we analyzed data collected in late 2022 of 95,632 active investors in a leading securities company to explore their preferences in the previous NISA. …”
Get full text
Article -
8685
Anonymous access protocol for media independent information service
Published 2010-01-01“…For anonymous access requirements of media independent information service(MIIS) in heterogeneous networks,an access protocol with user anonymity was proposed.With the aid of the home server,the mobile user and the information server mutually authenticated each other while keeping the mobile user anonymous.Compared with other schemes,the proposed protocol has better performance,and it is provably secure in the CK model.…”
Get full text
Article -
8686
U.S. strategy in Central Asia
Published 2013-04-01“…In this connection, the author notes that successive governments of the USA, the American political and expert community, business circles traditionally in the last twenty years pay particular attention to this region, bringing to secure the U.S. presence in the region the concept of "Big Central Asia".…”
Get full text
Article -
8687
Oil and Iran Regions Rural Economic Structure Alteration
Published 2018-03-01“…The oil has gradually obtained a predominant place in national economy since 1950 and nowadays, is the main important resource securing country financial needs. Two questions are the base of this research regarding contradiction of oil rent and traditional economic sectors including agriculture and livestock rearing which always have been intensified. …”
Get full text
Article -
8688
An Efficient Cluster Authentication Scheme Based on VANET Environment in M2M Application
Published 2013-11-01“…We have successfully included the establishment of secure channels, the detection of replay attacks, mutual cluster authentication, prevention of vehicle identity fabrication, and secure distribution of provisional session key.…”
Get full text
Article -
8689
A STUDY PROPOSING IMPROVEMENTS TO OVERLAY NETWORK ARCHITECTURE TO MITIGATE THE IMPACT OF DISTRIBUTED DENIAL-OF-SERVICE ATTACKS ON WEBSITE SYSTEMS
Published 2024-12-01“…This architecture employs a group of Secure Overlay Access Points (SOAP) to authenticate and distinguish legitimate users from malicious attackers, ensuring that valid requests are routed to hidden nodes within the overlay network via Secure Sockets Layer (SSL) connections. …”
Get full text
Article -
8690
Forest pest monitoring and early warning using UAV remote sensing and computer vision techniques
Published 2025-01-01“…To address this challenge, we propose SC-RTDETR, a novel framework for secure and robust object detection in forest pest monitoring using UAV imagery. …”
Get full text
Article -
8691
ORGANIZATIONAL AND LEGAL ASPECTS OF THE REGULATION OF LABOR RELATIONS OF AN EDUCATIONAL ORGANIZATION AND AN ADVISER TO THE DIRECTOR OF EDUCATION
Published 2024-07-01“…Law enforcement practice demonstrates problems in the field of concluding an employment contract and its essential conditions, securing a list of labor functions, securing a position in the staffing table, calculating wages, etc. …”
Get full text
Article -
8692
Employer Sponsored Retirement Savings Plans
Published 2012-05-01“…A financially secure retirement is a goal for many workers, and the ability to achieve that plan can be helped by employer-sponsored retirement plans. …”
Get full text
Article -
8693
Employer Sponsored Retirement Savings Plans
Published 2012-05-01“…A financially secure retirement is a goal for many workers, and the ability to achieve that plan can be helped by employer-sponsored retirement plans. …”
Get full text
Article -
8694
Empowering drones in vehicular network through fog computing and blockchain technology.
Published 2025-01-01“…The contribution includes a systematic architecture design and integration of blockchain technology for secure data storage. Fog computing was introduced for the Drone with Blockchain Technology (FCDBT) model, where drones collaborate to process IoT data efficiently. …”
Get full text
Article -
8695
False Financial Statement Identification Based on Fuzzy C-Means Algorithm
Published 2021-01-01“…In the discussion of this paper, most of the information comes from the annual reports of companies, administrative penalty decisions of the Securities Regulatory Commission, and some information comes from research reports made by securities institutions, which are limited sources of information. …”
Get full text
Article -
8696
Comparison of Insertion Characteristics of Prewarmed Igel and I-gel at Room Temperature in Adult Patients Undergoing Elective Surgeries- A Randomized Control Trial
Published 2025-01-01“…In Group C, airway was secured with Igel at room temperature. In Group W, patients airway was secured with I-gel which was prewarmed at 42˚Celsius. …”
Get full text
Article -
8697
Integrity of Best-Answer Assignments in Large Enrollment Classes; the role of Compulsory Attribution
Published 2024-12-01“…A unique feature that makes this method well-suited to large enrollment classes is the ability to secure and, when necessary, to delete stolen work, thereby precluding misappropriation. …”
Get full text
Article -
8698
Modern tendencies of functioning of nongovernmental pension funds in the system of obligatory pension insurance
Published 2019-03-01“…The article defines the strategy of investing APFs in various classes of assets during the study period, it has been revealed that of the total amount of invested pension savings in corporate securities, 2/3 of them fall on NPF investments. Over the last analyzed period, there has been a sharp increase in the investment of pension savings of NPFs in government securities, which is largely due to the tightening of regulatory requirements for the risk level of portfolio investment. …”
Get full text
Article -
8699
Identity-based ring signature scheme under standard model
Published 2008-01-01“…An identity based ring signature scheme using the method of Waters for constructing private key was presented. This scheme is secure in the standard model under the computational Diffie-Hellman assumption. …”
Get full text
Article -
8700
Kink of Subclavian Artery Mimicking Stenosis
Published 2016-01-01“…In this asymptomatic case, we have merged clinical and multiple imaging modalities to secure the diagnosis and treatment plan.…”
Get full text
Article