Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1881
On the Potential of Algorithm Fusion for Demographic Bias Mitigation in Face Recognition
Published 2024-01-01Get full text
Article -
1882
Malware Detection in Self-Driving Vehicles Using Machine Learning Algorithms
Published 2020-01-01“…Thus, intrusion detection is a key network security function in vehicles with open connectivity, such as self-driving and connected cars. …”
Get full text
Article -
1883
Film and Television Animation Sensing and Visual Image by Computer Digital Image Technology
Published 2022-01-01“…The proposed steganographic image enhancement algorithm by image preprocessing has higher security and better image enhancement effect.…”
Get full text
Article -
1884
An Attribute-Based Encryption Scheme with Revocation for Fine-Grained Access Control in Wireless Body Area Networks
Published 2014-11-01“…Our scheme provides confidentiality, security, and resistance to collusion attack. We analyze the correctness, security, and energy consumption of the scheme.…”
Get full text
Article -
1885
-
1886
A Survey on Event Tracking in Social Media Data Streams
Published 2024-03-01“…Event tracking in social networks finds various applications, such as network security and societal governance, which involves analyzing data generated by user groups on social networks in real time. …”
Get full text
Article -
1887
Intelligent two-phase dual authentication framework for Internet of Medical Things
Published 2025-01-01“…The security resilience was also evaluated against man-in-the-middle, replay, and brute force attacks. …”
Get full text
Article -
1888
An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks
Published 2020-06-01“…The sensors in wireless sensor networks are resource-constrained devices whereas the existing data security approaches have complex security mechanisms with high computational and response times affecting the network lifetime. …”
Get full text
Article -
1889
An Efficient GPU-Accelerated Algorithm for Solving Dynamic Response of Fluid-Saturated Porous Media
Published 2025-01-01Get full text
Article -
1890
-
1891
-
1892
Strongly Unforgeable Ring Signature Scheme from Lattices in the Standard Model
Published 2014-01-01“…Lattice-based ring signature schemes offer lower computational overhead and security from quantum attacks. In this paper, we offer a lattice-based scheme. …”
Get full text
Article -
1893
Fast Food Consumption, Quality of Diet, and Obesity among Isfahanian Adolescent Girls
Published 2012-01-01Get full text
Article -
1894
-
1895
Building Application-Related Patient Identifiers: What Solution for a European Country?
Published 2008-01-01“…We propose a method utilizing a derived social security number with the same reliability as the social security number. …”
Get full text
Article -
1896
Is the Financing of German Health and Long-Term Care Insurance Sustainable?
Published 2020-08-01“…Thus the sustainability of the German social security system is severely jeopardised.…”
Get full text
Article -
1897
Evaluasi Manajemen Keamanan Informasi Menggunakan Indeks Keamanan Informasi (KAMI) pada Jaringan (Studi Kasus: UIN Sunan Kalijaga Yogyakarta)
Published 2021-11-01“…Abstract Attacks on networks today are very common, with more and more ways to access data and the development of technology used, they will certainly cause an increase in network security threats. Evaluation of information security management using the information security index (KAMI) conducted on the network at UIN Sunan Kalijaga Yogyakarta obtained an index result of 407, which is considered still not optimal. …”
Get full text
Article -
1898
The Relationship Between Emotional and Other Factors in Information Diffusion
Published 2025-01-01Get full text
Article -
1899
NIGERIA’S INTRACTABLE CRISIS OF NATIONAL INSECURITY AND THE RESPONSE OF THE SOUTHWESTERN STATES
Published 2022-05-01“…This is in the face of the Nigeria Police Force found incapable to rise up to this national security challenge. To make up for this apparent insecurity, the South-west region instituted a regional security alternative Amoteku. …”
Get full text
Article -
1900