Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
941
Sybil-Resistant Self-Sovereign Identity Utilizing Attested Execution Secure Processors and Zero-Knowledge Membership Proofs
Published 2025-01-01Subjects: “…Attested execution secure processors…”
Get full text
Article -
942
Insurgency, Counterinsurgency and Human Security: A Case Study of Armed Violence in Papua during the COVID-19 Pandemic
Published 2022-04-01Subjects: “…human security…”
Get full text
Article -
943
Empowering Security Operation Center With Artificial Intelligence and Machine Learning—A Systematic Literature Review
Published 2025-01-01Subjects: Get full text
Article -
944
Ensuring Africa’s Food Security by 2050: The Role of Population Growth, Climate-Resilient Strategies, and Putative Pathways to Resilience
Published 2025-01-01Subjects: “…food security…”
Get full text
Article -
945
A Novel Security Methodology for Smart Grids: A Case Study of Microcomputer-Based Encryption for PMU Devices
Published 2021-01-01“…In this study, a two-way secure communication methodology underpinned by a chaos-based encryption algorithm for PMU devices is proposed. …”
Get full text
Article -
946
“An Endless Cycle of Worry and Hardship”: The Impact of COVID-19 on the Food Security of Somali Migrants and Refugees in Nairobi, Kenya
Published 2025-01-01“…Based on the results of a household survey and in-depth interviews with Somali migrants in Nairobi, Kenya in August 2022, this study documents the pandemic-related experience of these migrants in food access and consumption and assesses the overall impacts of COVID-19 on their food security. This study seeks to contribute to the emerging body of case study evidence that assesses the food security outcomes of the pandemic in vulnerable populations. …”
Get full text
Article -
947
Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models
Published 2024-01-01Subjects: Get full text
Article -
948
-
949
Changing Diets, Varying Food Consumption Patterns, and Food Security among Recent Zimbabwean Migrants in Windhoek, Namibia
Published 2025-01-01Subjects: “…migration, poverty, food security, dietary changes, food consumption patterns…”
Get full text
Article -
950
Information Security and Artificial Intelligence–Assisted Diagnosis in an Internet of Medical Thing System (IoMTS)
Published 2024-01-01“…Then, a machine learning - based model was employed to train the encryptor and decryptor for both biosignals and image infosecurity. After secure - data transmission, a case study is conducted for classifying medical images. …”
Get full text
Article -
951
Criminological examination of law acts and their drafts in the system of measures to combat corruption crime in the security and defense sector of Ukraine
Published 2024-12-01“…The article is devoted to the study of the essence, purpose of criminological examination of regulatory legal acts and their drafts as a tool for combating corruption crime in the security and defense sector of Ukraine. A narrow and broad understanding of the specified examination is proposed. …”
Get full text
Article -
952
Secured DICOM medical image transition with optimized chaos method for encryption and customized deep learning model for watermarking
Published 2025-04-01“…For healthcare professionals to view patient medical images, a secure online transmitting technique is essential. …”
Get full text
Article -
953
-
954
Blockchain-Powered Secure and Scalable Threat Intelligence System With Graph Convolutional Autoencoder and Reinforcement Learning Feedback Loop
Published 2025-01-01“…This paper proposes an approach that integrates secure blockchain technology with data preprocessing, deep learning, and reinforcement learning to enhance threat detection and response capabilities. …”
Get full text
Article -
955
Analyzes of the effects and security function social capital in sustainable rural border areas the villages of the central city of Saravan
Published 2016-06-01Subjects: Get full text
Article -
956
Crayfish optimization based pixel selection using block scrambling based encryption for secure cloud computing environment
Published 2025-01-01“…However, ensuring a high level of security in CC environments remains a significant challenge. …”
Get full text
Article -
957
-
958
The Effect of Alcoholism on Food Security in Rural Areas: A Case Study of Bufundi Subcounty Rubanda District Uganda.
Published 2024Subjects: Get full text
Thesis -
959
INTERNET COMMUNICATION: NEW CHALLENGES FOR THE YOUTH
Published 2013-10-01Subjects: Get full text
Article -
960
Prawo do wolności słowa a bezpieczeństwo narodowe w Polsce i Rosji ? analiza porównawcza
Published 2023-07-01Subjects: “…national security…”
Get full text
Article