Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1961
INSECURITY AND GIRL CHILD EDUCATION IN NORTH-EAST NIGERIA: A CASE OF CHIBOK AND DAPCHI QUAGMIRE
Published 2022-12-01“…The authors argued that, there is a nexus between girl child education growth, development and security. The paper recommend adequate security to all schools in the north-east as means of confidence building for parents to release their female children to school. …”
Get full text
Article -
1962
A Hybrid Approach to Protect Palmprint Templates
Published 2014-01-01“…Accuracy, changeability, and security are three critical requirements for template protection algorithms. …”
Get full text
Article -
1963
Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing
Published 2014-01-01Get full text
Article -
1964
-
1965
ASSESSMENT AND MAPPING OF THE MUDFLOW PHENOMENA INTENSITY IN CHARYN STATE NATIONAL NATURAL PARK
Published 2024-08-01Get full text
Article -
1966
A Two-Stage Greedy Genetic Algorithm for Simultaneous Delivery and Monitoring Tasks with Time Windows
Published 2025-01-01Get full text
Article -
1967
Cybersecurity Attacks and Detection Methods in Web 3.0 Technology: A Review
Published 2025-01-01“…Web 3.0 relies on decentralization, which uses blockchain technology to ensure secure user communication. However, Web 3.0 still faces many security challenges that might affect its deployment and expose users’ data and digital assets to cybercriminals. …”
Get full text
Article -
1968
A Mutual Broadcast Authentication Protocol for Wireless Sensor Networks Based on Fourier Series
Published 2015-12-01“…The most important thing of MBAP is the mutual broadcast authentication method which ensures the security of the network greatly.…”
Get full text
Article -
1969
Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks
Published 2021-01-01“…In the open wireless communication environment, security and privacy protection are important contents of VANET research. …”
Get full text
Article -
1970
-
1971
Local feature encoding for unknown presentation attack detection: An analysis of different local feature descriptors
Published 2021-07-01“…The experimental results over unknown scenarios taken from LivDet 2011 to LivDet 2017 show that our proposal reduces the top state‐of‐the‐art average classification error rates by up to four times, thereby making it suitable in real applications demanding high security. In addition, the best single configuration achieved the best results in the LivDet 2019 competition, with an overall accuracy of 96.17%.…”
Get full text
Article -
1972
Angus: efficient active learning strategies for provenance based intrusion detection
Published 2025-01-01Get full text
Article -
1973
Experimental Investigation of MgAl-NO2 and MgAl-CO3 LDHs on Durability of Mortar and Concrete
Published 2021-01-01Get full text
Article -
1974
Chaos-Based Engineering Applications with a 6D Memristive Multistable Hyperchaotic System and a 2D SF-SIMM Hyperchaotic Map
Published 2021-01-01“…Finally, we analyze the security of the proposed PRNG and image encryption mechanism, respectively. …”
Get full text
Article -
1975
Toward efficient authentication for space-air-ground integrated Internet of things
Published 2019-07-01“…Authentication is an essential step to protect the Internet of things security, and mutual authentication (i.e. two-way authentication) is especially important to ensure the security of both communication parties simultaneously. …”
Get full text
Article -
1976
-
1977
Transmission Lines Insulator State Detection Method Based on Deep Learning
Published 2025-01-01Get full text
Article -
1978
COMMUNITY POLICING AS A PANACEA FOR MITIGATING ARMED BANDITARY IN CENTRAL NIGERIA
Published 2023-08-01“…Findings from this study reveal that the locals should be empowered for enhanced effective and efficient community policing structure as the success of food security can only be guaranteed by security of lives and property. …”
Get full text
Article -
1979
-
1980
Mediating role of fatigue driving in the influence of job demand and insecurity on safety incidents among bus drivers
Published 2025-01-01“…Findings Both job demands and job security showed significant positive associations with safety incidents among the drivers. …”
Get full text
Article