Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1861
-
1862
Correction: The widening gender wage gap in the gig economy in China: the impact of digitalisation
Published 2025-01-01Get full text
Article -
1863
AVRUPA BİRLİĞİ ve IRAK KRİZİ : BÖLÜNMEDEN YENİDEN BİRLEŞMEYE UZUN, İNCE BİR YOL
Published 2003-01-01“…The aim of this article is to assess the implications of the recent Iraqi crisis for American-European relations, the European Union's evolving Common Foreign and Security Policy/ European Security and Defence Policy and the future prospects for global governance. …”
Get full text
Article -
1864
Corrosion Activity on CFRP-Strengthened RC Piles of High-Pile Wharf in a Simulated Marine Environment
Published 2017-01-01Get full text
Article -
1865
Transforming Alliances: A 20-Year Overview of Singapore-US Relations under Lee Hsien Loong
Published 2025-01-01“…It also examines how both countries have expanded their cooperation into non-traditional security areas such as counterterrorism, cybersecurity, and environmental security, adapting to the evolving global security environment. …”
Get full text
Article -
1866
A cross-layer approach to message authentication based on sparse representation for wireless body area networks
Published 2017-03-01“…Due to personal privacy, information security is a particularly important issue in wireless body area networks. …”
Get full text
Article -
1867
Cryptanalysis of hyperchaotic S-box generation and image encryption
Published 2024-12-01“…The structure and properties of S-boxes have a significant impact on the overall security of cryptographic systems. This article aims to improve cryptographic security through unique S-box construction methodologies. …”
Get full text
Article -
1868
Simulation of Motion Behavior of Concrete in Pump Pipe by DEM
Published 2021-01-01Get full text
Article -
1869
Impact of facial tattoos and paintings on face recognition systems
Published 2021-11-01Get full text
Article -
1870
Collusion-Tolerable and Efficient Privacy-Preserving Time-Series Data Aggregation Protocol
Published 2016-07-01“…We formally analyzed the security of our protocol and results showed that the protocol is secure if the Computational Diffie-Hellman (CDH) problem is intractable. …”
Get full text
Article -
1871
IMPACT OF PENSION SYSTEM REFORMS ON PUBLIC FINANCE EXPENDITURES IN POLAND
Published 2019-12-01“…The social security system in each country, if it exists, plays a crucial role in supporting citizens and specific expenditures of the public finance system. …”
Get full text
Article -
1872
-
1873
Sécurité sanitaire sous dépendance
Published 2021-07-01“…Improving public health security on a sustainable basis is not simply a matter of adjusting economic variables or a few incentives, even on a large budgetary scale. …”
Get full text
Article -
1874
An Anonymous Authentication Scheme in VANETs of Smart City Based on Certificateless Group Signature
Published 2020-01-01“…From the proofs of correctness and security, we know that it does not only has anonymity and traceability of the group signature scheme but also has unforgeability and forward security. …”
Get full text
Article -
1875
-
1876
-
1877
Deep Recurrent Model for Server Load and Performance Prediction in Data Center
Published 2017-01-01Get full text
Article -
1878
AVQS: Attack Route-Based Vulnerability Quantification Scheme for Smart Grid
Published 2014-01-01“…Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. …”
Get full text
Article -
1879
Prioritas Investasi Keamanan Informasi Menggunakan Analytic Network Process (ANP) Bagi Pemerintah Daerah Provinsi Kalimantan Tengah
Published 2024-12-01“…Surveys were conducted with decision-makers and technical managers related to information security. The results of the study show that decision-makers prioritize the information security management framework, while technical managers focus more on technological aspects. …”
Get full text
Article -
1880
Price Surges in Basic Necessities — Redistribution of Burdens Required
Published 2022-09-01“…Appropriate measures would be the payment of inflation compensation for those receiving basic security, a reform of the updating of basic security benefits and an income-related transfer payment for households without basic security. …”
Get full text
Article