Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
141
«Community Spirit» in Tackling Security Threats
Published 2023-09-01Subjects: “…translation of security…”
Get full text
Article -
142
The EU Methodology of Security and Defense Planning
Published 2015-10-01Subjects: Get full text
Article -
143
Federated Learning in Data Privacy and Security
Published 2024-12-01“…This research sheds light on the topics of federated learning and data security.…”
Get full text
Article -
144
Information Warfare, Threats and Information Security
Published 2014-12-01Subjects: Get full text
Article -
145
Environmental degradation and food security in Somalia
Published 2025-02-01Subjects: Get full text
Article -
146
PRODUCTION AND SECURITY OF FOOD IN GLOBAL CIRCLE
Published 2022-12-01Subjects: Get full text
Article -
147
Enhanced SDIoT Security Framework Models
Published 2016-05-01“…In order to address such problems, this study aims to investigate strategies for establishing a security framework for the configuration of a software-defined IoT environment and efficient provision of security services. …”
Get full text
Article -
148
Research on Android security of broadcasting mechanism
Published 2016-10-01“…In recent years, there has been increased interest in the research of Android component security. Broadcast receiver is one of the 4 components in Android, strangely enough, few papers have been published regarding to its security. …”
Get full text
Article -
149
Research and practice of SASE cloud security
Published 2022-01-01Subjects: “…cloud security…”
Get full text
Article -
150
Suggestions on cyber security talents cultivation
Published 2015-12-01Subjects: “…cyber security…”
Get full text
Article -
151
Application of computer vision in intelligent security
Published 2021-08-01Subjects: Get full text
Article -
152
Principles and Practices to Secure and Hold Interest
Published 2016-02-01“… Securing and holding student interest is a major challenge for teachers. …”
Get full text
Article -
153
New Aspects of National Security Startegy
Published 2012-12-01Subjects: “…military and political security…”
Get full text
Article -
154
The concept of security in German foreign policy
Published 2024-08-01Subjects: Get full text
Article -
155
-
156
Sustainable water reuse for water security
Published 2025-01-01Subjects: “…water security…”
Get full text
Article -
157
-
158
Research framework for food security and sustainability
Published 2025-01-01“…Abstract This article presents a framework for food security and sustainability research, developed by industry, academia, and public sector experts. …”
Get full text
Article -
159
Security test of 101 protocol of FTU
Published 2018-10-01“…The IEC60870-5-101 protocol is mainly used for transmitting messages between the primary station and the substation of the power SCADA data monitoring and acquisition system.Since the message mainly adopts “frame check and sum” to ensure communication security,there is a common security risk among the intermediate personnel.In order to verify the communication problems of the 101 protocol,the communication system between the FTU and the main station of the feeder terminal was constructed,which collected the telemetry signal of the FTU mobile IoT card on the cloud server,and used the man-in-the-middle attack mode to use the ARP to intercept the communication data packet.To analyze the telemetry information in the data packet,try data tampering and successfully make the monitoring data not updated in time.Finally,an enhancement mechanism against external attacks was proposed.…”
Get full text
Article -
160