Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1921
Efficient Privacy-Preserving Protocol for k-NN Search over Encrypted Data in Location-Based Service
Published 2017-01-01Get full text
Article -
1922
Deep learning for cyber threat detection in IoT networks: A review
Published 2024-01-01“…While these innovations offer unprecedented opportunities, they also introduce complex security challenges. Cybersecurity is a pivotal concern for intrusion detection systems (IDS). …”
Get full text
Article -
1923
Bifurcation of a Fractional-Order Delayed Malware Propagation Model in Social Networks
Published 2019-01-01“…In recent years, with the rapid development of the Internet and the Internet of Things, network security is urgently needed. Malware becomes a major threat to network security. …”
Get full text
Article -
1924
Filipino attitude and perception on Subscriber Identity Module (SIM) Card Registration Act
Published 2024-12-01“…These insights underscore the need for more robust security measures in the registration process to enhance public trust. …”
Get full text
Article -
1925
Intelligent Intrusion Detection System Against Various Attacks Based on a Hybrid Deep Learning Algorithm
Published 2025-01-01“…In order to guarantee the complete security of the IoT, it is important to deal with these challenges. …”
Get full text
Article -
1926
Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent Threats
Published 2024-12-01“…As a paradigm shift in network security, the idea of Zero Trust Architecture has attracted a lot of attention recently. …”
Get full text
Article -
1927
-
1928
Soil warming increases the active antibiotic resistome in the gut of invasive giant African snails
Published 2025-02-01Get full text
Article -
1929
UNREST AND UNFILLED STOMACHS: UNRAVELLING THE LINKAGE BETWEEN ARMED CONFLICT AND FOOD INSECURITY IN NORTH CENTRAL REGION OF NIGERIA
Published 2024-07-01“…Due to resource competition, political and ethnic tensions, historical grievances, and religious extremism, the region has seen protracted armed conflicts. Food security has declined as an outcome of disruptions in agriculture, infrastructure, and market systems. …”
Get full text
Article -
1930
Obesity Differentially Affects Phenotypes of Polycystic Ovary Syndrome
Published 2012-01-01Get full text
Article -
1931
Indoor localization based on subarea division with fuzzy C-means
Published 2016-08-01Get full text
Article -
1932
-
1933
Variational Estimation of Optimal Signal States for Quantum Channels
Published 2024-01-01Get full text
Article -
1934
Institutionalization of the UN Police Peacekeeping
Published 2019-03-01“…Article studies the strategic frame, organizational and operational aspects of UN peacekeeping missions police components activities to ensure sustaining peace.It is noted that at present the UN Police actively participates in UN peace operations acting as an integrated solution of issues of peace and security. Consideration is also given to the growing importance of the UN Police to international peace and security and the increased attention given to policing by the Security Council and the Secretary General.The UN police now engage in United Nations peace operations across the entire peace and security spectrum, from conflict prevention to peacekeeping and peacebuilding. …”
Get full text
Article -
1935
Bearing Capacities of Different-Diameter Concrete-Filled Steel Tubes under Axial Compression
Published 2016-01-01Get full text
Article -
1936
Explaining the Integrated Approach to Border Management and Control: A Case Study of Iranian Land Borders
Published 2023-12-01“…Given the different approaches to border control and management, it can be seen that this issue is still viewed as a security issue in developing countries, including Iran, and most of the approaches related to this are from a purely security perspective. …”
Get full text
Article -
1937
THE POLITICS OF INSECURITY REPORTAGE IN NORTHERN NIGERIA
Published 2024-05-01“… Nigeria is faced with different challenges that nearly comatose the security architecture of the country. In the geopolitical North, it started as mere conflict over access to land largely involving herders and farmers. …”
Get full text
Article -
1938
Experimental Study on the Performance and Microstructure of Cementitious Materials Made with Dune Sand
Published 2016-01-01Get full text
Article -
1939
A Stackelberg-Game-Based Power Control Algorithm for Wireless Mesh Networks
Published 2013-01-01Get full text
Article -
1940
Water Accounting and Productivity Analysis to Improve Water Savings of Nile River Basin, East Africa: From Accountability to Sustainability.
Published 2024“…Climate change impacts on drylands pose more vexing risks to socio-ecological systems, resulting in food security issues, biodiversity loss, and livelihood shifts in Africa. …”
Get full text
Article