Suggested Topics within your search.
Suggested Topics within your search.
- Agricultural laws and legislation 1
- Automobiles 1
- COMPUTERS / Security / General 1
- Civil rights 1
- Climate change mitigation 1
- Crime prevention 1
- Education 1
- Ethnoscience 1
- Fault location (Engineering) 1
- Information technology 1
- Internal security 1
- Maintenance and repair 1
- Moral and ethical aspects 1
- National security 1
- POLITICAL SCIENCE / International Relations / General 1
- POLITICAL SCIENCE / Political Freedom & Security / International Security 1
- POLITICAL SCIENCE / Political Freedom & Security / Terrorism 1
- Prevention 1
- Rural development 1
- Security, International 1
- Sustainable development 1
- Technology 1
- Violence 1
-
1
Research on Information Security Mechanism Used in Network Video Surveillance System
Published 2013-08-01Get full text
Article -
2
-
3
Deterministic Systems for Cryptographic Primitives Used in Security Models in Particular IoT Configurations
Published 2025-03-01“…Computing systems grouped in subnets use distributed security models, in general, by creating session keys based on the Diffie–Hellman model, and calculating the necessary parameters for this, on each of the systems. …”
Get full text
Article -
4
-
5
Use of Attack Graphs in Security Systems
Published 2014-01-01“…We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.…”
Get full text
Article -
6
Voice Security Using Hybrid Algorithm
Published 2010-12-01“…The algorithm can hide as many as bits of data in the image by changing one bit in each block of size . High security algorithm was achieved using three layers to make it difficult to break by attacker. …”
Get full text
Article -
7
A New Highly Secure Optical Image Security Technique Using Gyrator Transform for Image Security-Related Applications
Published 2022-01-01“…This work uses information hiding followed by image encryption using Gyrator Transform (GT) using mean gradient key-based block swapping techniques. …”
Get full text
Article -
8
Enhancing Data Security in Distributed Systems Using Homomorphic Encryption and Secure Computation Techniques
Published 2025-01-01“…Distributed systems are now an indispensable part of modern computing, and so too must be their security, with privacy-preserving computations being in high demand. …”
Get full text
Article -
9
Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets
Published 2014-01-01Get full text
Article -
10
The Use of Digital Media and Security Precautions in Adulthood
Published 2023-01-01“…Age was positively correlated with security precautions but negatively with the use of social media. …”
Get full text
Article -
11
Possibilities of Using Artificial Intelligence in Security Analysis
Published 2024-12-01“…Objectives The aim of the article is to present the characteristics and analytical potential of artificial intelligence in the area of security analysis. The text is to help answer the following research questions: • What are the characteristics of analytical imagination identified as a tool that could be used by artificial intelligence in security analyses? …”
Get full text
Article -
12
A Novel Information Security Framework for Securing Big Data in Healthcare Environment Using Blockchain
Published 2023-12-01“…The framework is based on the principles of confidentiality and immutability to ensure the security and privacy of health care data. The framework is designed to support a wide range of information sources and use cases including patient records, clinical research, medical imaging, genomic data, and pharmaceutical trials. …”
Get full text
Article -
13
Practical security analysis and attack strategies on permutation functions used in IoT supply chain systems
Published 2025-05-01“…Since construction costs are generally directly related to the complexity of security methods, researchers are exploring methods that provide acceptable security with minimal hardware complexity. …”
Get full text
Article -
14
Simulators for Processors Used in Virtualization: A Survey
Published 2025-01-01“…Sharing of resources with virtualization raised many security concerns, leading to the development of processors enhanced for security in virtualization and consequently to the need for architectural simulators for processors used in a virtualized environment. …”
Get full text
Article -
15
Indoor Vertical Farming Systems for Food Security and Resource Sustainability
Published 2020-04-01Get full text
Article -
16
Indoor Vertical Farming Systems for Food Security and Resource Sustainability
Published 2020-04-01Get full text
Article -
17
Blockchain and Bigdata to Secure Data Using Hash and Salt Techniques
Published 2022-04-01“…Hashing algorithms are used in Blockchain to keep the data safe. Hashing algorithms like SHA 256 are used to make it more secure. …”
Get full text
Article -
18
Computer Monitoring and Security System Using Bluetooth Technology
Published 2010-12-01“…The design and implementation of security, monitoring and controlling system with data communication based on Bluetooth technology is described. …”
Get full text
Article -
19
Enhacing security in banking transactions using artificial intelligence
Published 2025-07-01Get full text
Article -
20
The use of qualitative research in security sciences. Part I
Published 2025-07-01Subjects: Get full text
Article