Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1901
Using Burstiness for Network Applications Classification
Published 2019-01-01“…Network traffic classification is a vital task for service operators, network engineers, and security specialists to manage network traffic, design networks, and detect threats. …”
Get full text
Article -
1902
-
1903
ILLEGAL TRANSNATIONAL MIGRATION AND ILLICIT DRUG TRAFFICKING IN NIGERIA
Published 2023-09-01“…There should be retraining, re-orientation and a clean-up strategy within the Nigerian security agencies to curb corruption in the security system. …”
Get full text
Article -
1904
Efficient Pairing-Free Privacy-Preserving Auditing Scheme for Cloud Storage in Distributed Sensor Networks
Published 2015-07-01“…The previous research of distributed sensor network security has focused on secure information in communication; however the research of secure data storage has been overlooked. …”
Get full text
Article -
1905
Trusted Computing Strengthens Cloud Authentication
Published 2014-01-01“…Companies encounter IAM as security challenges while adopting more technologies became apparent. …”
Get full text
Article -
1906
Effectiveness Evaluation of Random Forest, Naive Bayes, and Support Vector Machine Models for KDDCUP99 Anomaly Detection Based on K-means Clustering
Published 2025-01-01“…Security in the World Wide Web has recently seen an enormous upgrade in almost every aspect. …”
Get full text
Article -
1907
Lightweight load-balanced and authentication scheme for a cluster-based wireless sensor network
Published 2021-02-01“…Our research on relevant literature shows that the existing authentication schemes do not fully consider the load balancing of cluster heads, while the load balancing schemes ignore the security authentication of cluster heads. Therefore, this article effectively combines load balancing and security verification, and proposes a lightweight load balancing and verification scheme (secure load and energy balancing) based on clustered wireless sensor networks. …”
Get full text
Article -
1908
Reliable detection of doppelgängers based on deep face representations
Published 2022-05-01Get full text
Article -
1909
Wireless Sensor Network Applications in Smart Grid: Recent Trends and Challenges
Published 2012-09-01“…However, the increased application of wireless sensor network also introduce new security challenges, especially related to privacy, connectivity, and security management, causing unpredicted expenditure and disaster to both utilities and consumers. …”
Get full text
Article -
1910
Linear Complexity of a New Class of Quaternary Generalized Cyclotomic Sequence with Period 2pm
Published 2020-01-01Get full text
Article -
1911
Health system financing fragmentation and maternal mortality transition in Mexico, 2000–2022
Published 2025-01-01“…Seven out of ten maternal deaths occurred in the population without social security from 2000 to 2018, then decreasing to six out of ten from 2020. …”
Get full text
Article -
1912
Les syndicats, les commissaires et le politique : (re)valorisations et conflits autour de la profession policière en Tunisie (2011-2022)
Published 2023-12-01“…After 14 January 2011, the socio-professional conditions of members of the security forces became increasingly public, but also led to an unprecedented mobilisation of Tunisian police officers. …”
Get full text
Article -
1913
Visceral Adiposity Index in Breast Cancer Survivors: A Case-Control Study
Published 2020-01-01Get full text
Article -
1914
-
1915
Intrusion Detection Systems in Wireless Sensor Networks: A Review
Published 2013-05-01“…Their distributed nature, multihop data forwarding, and open wireless medium are the factors that make WSNs highly vulnerable to security attacks at various levels. Intrusion Detection Systems (IDSs) can play an important role in detecting and preventing security attacks. …”
Get full text
Article -
1916
In Favor of Endowing the Energy and Climate Fund with Borrowing Powers
Published 2022-06-01“…Abstract Energy security and independence are the new imperatives following the war of aggression on Ukraine ordered by Vladimir Putin. …”
Get full text
Article -
1917
-
1918
دور تحلیلات البیانات الضخمة فى انترنت الأشیاء : دراسة تحلیلیة مقارنة
Published 2020-04-01“…The study Aimed to Identify in a Relation Ship big data analytics in IOTapplications benefits big data in internet of things , and Show the most popularplatforms to big data and IOT such as : Kaa , Hadoop , MAPR , and study therequirements of big data analytics in IOT finally show challenges facing big datain IOT the study was approved on the comparative method and reached severalresults the most important of them , the main problems that you face big data inIOT security and privacy 97%The most important results of the study : Big data and the Internet of things are complementary to each other, andthis integration is achieved through data analysis platforms. One of the most common security problems in IoT applications with bigdata is data center security, access control, redundant data filtering. One of the standards of open source Internet of Things platforms isstandards of integration, security and confidentiality, protocols,visualization support, databases. One of the most used big data analytics platforms is Hadoop, with apercentage of 90%, followed by Map R with 72.3%. …”
Get full text
Article -
1919
Decentralized identifiers based IoT data trusted collection
Published 2025-02-01“…Abstract The data collection processes of IoT devices face significant security challenges, including access authorization, secure transmission, and secure storage. …”
Get full text
Article -
1920
Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis
Published 2013-01-01Get full text
Article