Suggested Topics within your search.
Suggested Topics within your search.
- Agricultural laws and legislation 1
- Automobiles 1
- COMPUTERS / Security / General 1
- Civil rights 1
- Climate change mitigation 1
- Crime prevention 1
- Education 1
- Ethnoscience 1
- Fault location (Engineering) 1
- Information technology 1
- Internal security 1
- Maintenance and repair 1
- Moral and ethical aspects 1
- National security 1
- POLITICAL SCIENCE / International Relations / General 1
- POLITICAL SCIENCE / Political Freedom & Security / International Security 1
- POLITICAL SCIENCE / Political Freedom & Security / Terrorism 1
- Prevention 1
- Rural development 1
- Security, International 1
- Sustainable development 1
- Technology 1
- Violence 1
-
1
Use of Attack Graphs in Security Systems
Published 2014-01-01“…We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.…”
Get full text
Article -
2
The Use of Digital Media and Security Precautions in Adulthood
Published 2023-01-01“…Age was positively correlated with security precautions but negatively with the use of social media. …”
Get full text
Article -
3
Voice Security Using Hybrid Algorithm
Published 2010-12-01“…The algorithm can hide as many as bits of data in the image by changing one bit in each block of size . High security algorithm was achieved using three layers to make it difficult to break by attacker. …”
Get full text
Article -
4
A New Highly Secure Optical Image Security Technique Using Gyrator Transform for Image Security-Related Applications
Published 2022-01-01“…This work uses information hiding followed by image encryption using Gyrator Transform (GT) using mean gradient key-based block swapping techniques. …”
Get full text
Article -
5
The use of qualitative research in security sciences. Part I
Published 2025-07-01Subjects: Get full text
Article -
6
Analysis of information security technologies for use in the enterprise infrastructure
Published 2023-02-01“…The analysis was carried out and the features of information protection technology were disclosed for the purpose of possible use in the infrastructure of the enterprise. The analysis of domestic and foreign software for practical use is carried out.Conclusion. …”
Get full text
Article -
7
The Use of Artificial Intelligence Technologies in Energy and Climate Security
Published 2024-12-01“…This study provides a theoretical analysis of the use and application of artificial intelligence (AI) in the energy sector as it relates to climate security. …”
Get full text
Article -
8
Enhancing Data Security in Distributed Systems Using Homomorphic Encryption and Secure Computation Techniques
Published 2025-01-01“…Distributed systems are now an indispensable part of modern computing, and so too must be their security, with privacy-preserving computations being in high demand. …”
Get full text
Article -
9
Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets
Published 2014-01-01Get full text
Article -
10
Indoor Vertical Farming Systems for Food Security and Resource Sustainability
Published 2020-04-01Get full text
Article -
11
Indoor Vertical Farming Systems for Food Security and Resource Sustainability
Published 2020-04-01Get full text
Article -
12
Possibilities of Using Artificial Intelligence in Security Analysis
Published 2024-12-01“…Objectives The aim of the article is to present the characteristics and analytical potential of artificial intelligence in the area of security analysis. The text is to help answer the following research questions: • What are the characteristics of analytical imagination identified as a tool that could be used by artificial intelligence in security analyses? …”
Get full text
Article -
13
A Novel Information Security Framework for Securing Big Data in Healthcare Environment Using Blockchain
Published 2023-12-01“…The framework is based on the principles of confidentiality and immutability to ensure the security and privacy of health care data. The framework is designed to support a wide range of information sources and use cases including patient records, clinical research, medical imaging, genomic data, and pharmaceutical trials. …”
Get full text
Article -
14
Experiments in globalisation, food security and land use decision making.
Published 2014-01-01“…In reality, however, such specialisation is often constrained by practical or political barriers, including those intended to ensure national or regional food security. These are likely to produce globally sub-optimal distributions of land uses. …”
Get full text
Article -
15
Land cover, land use, climate change and food security
Published 2023-12-01Subjects: Get full text
Article -
16
Excessive Use of Consent Decrees by the Brazilian Securities and Exchange Commission
Published 2019-10-01“…A total number of 405 terms were approved by the Brazilian Securities and Exchange Commission (CVM) between 2009 and 2014, characterizing a wide use of such regulatory instrument. …”
Get full text
Article -
17
METHOD OF ESTIMATION NATIONAL SECURITY IN AIR SPACE USE MANAGEMENT
Published 2016-11-01Subjects: Get full text
Article -
18
Blockchain and Bigdata to Secure Data Using Hash and Salt Techniques
Published 2022-04-01“…Hashing algorithms are used in Blockchain to keep the data safe. Hashing algorithms like SHA 256 are used to make it more secure. …”
Get full text
Article -
19
Computer Monitoring and Security System Using Bluetooth Technology
Published 2010-12-01“…The design and implementation of security, monitoring and controlling system with data communication based on Bluetooth technology is described. …”
Get full text
Article -
20
Enhacing security in banking transactions using artificial intelligence
Published 2025-07-01Get full text
Article