Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
901
International experience in mobilising mechanisms to combat organised crime
Published 2024-11-01Subjects: Get full text
Article -
902
THE DUAL MODEL OF THE DEVELOPMENT OF GERMAN ARMED FORCES
Published 2017-11-01Subjects: Get full text
Article -
903
Research on Safety Risks of Speech Information
Published 2022-11-01Subjects: “…security risk…”
Get full text
Article -
904
PCA mix‐based Hotelling's T2 multivariate control charts for intrusion detection system
Published 2022-05-01Subjects: “…computer network security…”
Get full text
Article -
905
Revisit two memoryless state‐recovery cryptanalysis methods on A5/1
Published 2023-07-01Subjects: Get full text
Article -
906
A Mobile Science Laboratory: Architectural Design For Secondary Schools In Uganda
Published 2019Subjects: “…Security, Mobile, Learning…”
Get full text
Article -
907
Creating a model of threats to Ukraine’s national critical infrastructure as a basis for ensuring its security and resilience
Published 2024-03-01Subjects: Get full text
Article -
908
Harnessing the potential of shared data in a secure, inclusive, and resilient manner via multi-key homomorphic encryption
Published 2024-06-01“…Using the AI4I public predictive maintenance dataset, we demonstrate the MK-HELR algorithm, setting the stage for further research in secure, dynamic, and collaborative multi-party learning scenarios.…”
Get full text
Article -
909
Si Substrate Backside—An Emerging Physical Attack Surface for Secure ICs in Flip Chip Packaging
Published 2024-01-01Subjects: Get full text
Article -
910
Optimal Information Hiding: Advanced Bitstream-Based Watermarking for Secure and Efficient Integration of Image Data in Digital Videos
Published 2024-01-01“…The outcomes underscore its practical viability for copyright protection, contributing to a more secure digital media landscape.…”
Get full text
Article -
911
EFFECT OF TRAINING ON CAREER PERFORMANCE OF NIGERIA SECURITY AND CIVIL DEFENSE CORPS (NSCDC) PERSONNEL IN KADUNA STATE COMMAND
Published 2022-12-01“…It recommended among others that the NSCDC as a security organization should organize training on regular basis to improve the career performance of personnel of their organization in view of the current security challenges facing the country. …”
Get full text
Article -
912
A Federated Learning Framework for Enhanced Data Security and Cyber Intrusion Detection in Distributed Network of Underwater Drones
Published 2025-01-01“…This approach significantly improves data security by ensuring that sensitive information never leaves the local devices, reducing the risk of interception or compromise during transmission. …”
Get full text
Article -
913
EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks
Published 2024-12-01“…We also create an access control system based on smart contracts and a secure multi-party computing protocol for model updates. …”
Get full text
Article -
914
Legal basis for ensuring public security and order at the regional level and the place of administrative and legal norms among them
Published 2022-12-01Subjects: Get full text
Article -
915
-
916
-
917
Land Tenure Security and Sustainable Land Investment: Evidence from National Plot-Level Data in Rural China
Published 2025-01-01Subjects: Get full text
Article -
918
A fuzzy logic approach within the DPSIR framework to address the inherent uncertainty and complexity of water security assessments
Published 2025-01-01Subjects: Get full text
Article -
919
COVID-19 as a Catalyst of Food Security Crisis. Whether the Existing System of Agriculture Can Remain the Same
Published 2022-12-01Subjects: Get full text
Article -
920
A Comparative Study of Anomaly Detection Techniques for IoT Security Using Adaptive Machine Learning for IoT Threats
Published 2024-01-01“…The results emphasize the promising prospects of FusionNet in security, healthcare, and other domains where accurate anomaly detection is crucial.…”
Get full text
Article