Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1841
Modification of Fe3O4 magnetic nanoparticles for antibiotic detection
Published 2025-02-01Get full text
Article -
1842
Design and Implementation of a Data Sharing Model for Improving Blockchain Technology
Published 2022-01-01“…Thus, data sharing and security are vital to realizing the value of the data. …”
Get full text
Article -
1843
An End-to-End Rumor Detection Model Based on Feature Aggregation
Published 2021-01-01Get full text
Article -
1844
Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing Mechanism
Published 2014-01-01“…This control mechanism for benign worm propagation is of guiding significance to control the network security.…”
Get full text
Article -
1845
The Application of Approximate Entropy Theory in Defects Detecting of IGBT Module
Published 2012-01-01Get full text
Article -
1846
Automating Risk Analysis of Software Design Models
Published 2014-01-01“…Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. …”
Get full text
Article -
1847
Public Housing Allocation Model in the Guangdong-Hong Kong-Macao Greater Bay Area under Clustering Algorithm
Published 2021-01-01“…The allocation method of public housing based on demand clustering analysis focuses on improving the housing security level and strives to meet the higher-level housing improvement needs of housing security objects, so as to provide security objects with more expected living conditions and improve housing allocation effect.…”
Get full text
Article -
1848
PREVENTING VIOLENCE CRIMES (KIDNAPPING, ARMED ROBBERY, BRIGANDAGE OR COMMUNITY MASSACRE) WITH DRONES: AN EFFECTIVE ALTERNATIVE TO VEHICULAR PATROLS IN NIGERIA
Published 2024-07-01“… Security is a vital component of any Nation’s growth and development, with its absence, there is no progress. …”
Get full text
Article -
1849
-
1850
Modeling and Analysis of the Spread of Malware with the Influence of User Awareness
Published 2021-01-01“…By incorporating the security awareness of computer users into the susceptible-infected-susceptible (SIS) model, this study proposes a new malware propagation model, named the SID model, where D compartment denotes the group of nodes with user awareness. …”
Get full text
Article -
1851
Perioperative Management of Patient with Systemic Mastocytosis Going for Total Thyroidectomy
Published 2025-01-01Get full text
Article -
1852
Perioperative Management of Patient with Systemic Mastocytosis Going for Total Thyroidectomy
Published 2025-01-01Get full text
Article -
1853
Towards a Severity Assessment Method for Potential Cyber Attacks to Connected and Autonomous Vehicles
Published 2020-01-01“…According to the UK CAV Cyber Security Principles, preventing CAVs from cyber security attacks need to be considered at the beginning of CAV development. …”
Get full text
Article -
1854
-
1855
Framework to analyze and exploit the smart home IoT firmware
Published 2025-02-01“…Thousands of smart gadgets are linked to the internet each month, and due to various privacy and security issues, such devices may be vulnerable to evil attackers. …”
Get full text
Article -
1856
Kidney Function in the Wixarika (Huichol) Ethnic Group, a Disadvantaged Population Underevaluated in Mexico
Published 2025-04-01Get full text
Article -
1857
A Bayesian Compressive Sensing Vehicular Location Method Based on Three-Dimensional Radio Frequency
Published 2014-06-01Get full text
Article -
1858
Blockchain-Driven Optimized Chaotic Encryption Scheme for Medical Image Transmission in IoT-Edge Environment
Published 2025-01-01“…The evaluation metrics like as NACI, UACI, Entropy and standard verification methods such as NIST standard tests are deployed and analyzed. To prove it security strength, proposed secured BC framework is compared with the wide-variety of secured frameworks. …”
Get full text
Article -
1859
Optimalisasi Strategi Intelijen dalam Menghadapi Ancaman TPPO Jaringan Kamboja dan Implikasinya bagi Keamanan Nasional
Published 2024-12-01“…The study aims to analyze the causal factors, the level of threat to national security, and the intelligence strategy in preventive efforts. …”
Get full text
Article -
1860