Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1821
Sécurité aux frontières : Portée et limites de la stratégie algérienne
Published 2016-06-01“…This article analyzes the Algerian State’s border security strategy. Their increasing instability forces it to be one of the most involved actors in the maintenance of regional security. …”
Get full text
Article -
1822
Robust Spectrum Sensing Demonstration Using a Low-Cost Front-End Receiver
Published 2015-01-01Get full text
Article -
1823
Is Securitisation a Natural and Useful Response to Existential Threats? Introducing the Idea of Peacification
Published 2025-01-01“…After all, security is a property of an agent, while security issues traditionally arise from threats posed by another agent. …”
Get full text
Article -
1824
A Stable Hash Function Based on Parity-Dependent Quantum Walks With Memory (August 2023)
Published 2024-01-01Get full text
Article -
1825
Molecular Detection of Persistent Francisella tularensis Subspecies holarctica in Natural Waters
Published 2011-01-01Get full text
Article -
1826
-
1827
BORDER MANAGEMENT, ARMED BANDITRY AND TERRORISM MITIGATION IN NIGERIA
Published 2024-08-01“…This paper is set to examine key security challenges and socio-economic effects of insurgency and Armed Banditry in Nigeria; seeing that the country as a nation state is under a severe internal socio-economic and security threat. …”
Get full text
Article -
1828
Prototype Of DPO Search Information System (People Search List) On CCTV Cameras Using Face Recognition
Published 2023-12-01“…The efficiency aspect of the housing security sector is the main consideration in creating information technology in a CCTV security development, because so far CCTV has not guaranteed maximum housing security, because CCTV can only record not analyze. …”
Get full text
Article -
1829
A hierarchical colored Petri net–based cyberattacks response strategy making approach for critical infrastructures
Published 2020-01-01“…Critical infrastructures are essential for national security, economy, and public safety. As an important part of security protection, response strategy making provides useful countermeasures to reduce the impacts of cyberattacks. …”
Get full text
Article -
1830
New Work Forms: How to Integrate Them in Our Social Insurances
Published 2020-04-01“…Abstract The increase in the group of atypical workers means that their social security protection needs reviewing. How far should we go in approaching social security for self-employed workers, flex workers, crowd workers and all new employment relationships differently? …”
Get full text
Article -
1831
Dream of European Army: Is It a Feasible Objective or Not?
Published 2023-10-01“…We have witnessed new security and military efforts from the EU in the first two decades of the 2000s, such as the European Security Strategy, EU’s Global Strategy and Security Compass. 2013 marked a turning point when the USA deployed its new nuclear weapons in Europe. …”
Get full text
Article -
1832
Experimental Study and Theoretical Verification of Explosion-Proof Performance of Insulated Glass
Published 2020-01-01Get full text
Article -
1833
Generic, specific and direct object of a crime under the Article 330 of the Criminal Code of Ukraine
Published 2018-12-01“…Generic object of a crime under the Art. 330 of the Criminal Code of Ukraine, has been defined as social relations existing with regard to the security of state secrets and official information gathered in the course of operative and search, counter-intelligence activities, in the field of the country defense, as well as the security of the state border of Ukraine and military security in terms of providing draft call and mobilization. …”
Get full text
Article -
1834
-
1835
SensoTrust: Trustworthy Domains in Wireless Sensor Networks
Published 2015-07-01“…Security domains can be deployed as an add-on service to merge with any service already deployed, obtaining a new secured service.…”
Get full text
Article -
1836
Increasing the cyber resilience of SMEs through open-source solutions and international collaboration
Published 2025-01-01“…Open-source solutions offer financial accessibility, flexibility, and increased security, supported by global communities that contribute to their continuous improvement. …”
Get full text
Article -
1837
An adaptive intrusion detection and prevention system for Internet of Things
Published 2019-11-01“…Therefore, security has become a big challenge more than before. …”
Get full text
Article -
1838
-
1839
-
1840