ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Social Sciences
Education
Sports
Technology
Research
Agronomy and forestry
Biology
Economy
Computing
Food and nutrition
all records (74)

Languages
English
Spanish
Portuguese
German

Countries
Indonesia
USA
Brazil
Ukraine
Poland
South Africa
Turkey, Turkish Republic
Spain
Canada
Germany
all records (75)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
43.568  Articles
1 of 4.358 pages  |  10  records  |  more records»
Context. The topical approaches to preventive estimations and mathematical modeling of cyber attacks processes and supply of external technological informational threats were considered, which may be directed on the physical security system of modern nucl... see more

Communication security is one of the top security challenges for connected devices. Different from other links such as backhaul, the last mile technology also depends on the requirements of end users. Wireless technologies are generally selected for the m... see more

Today’s technology are changing very rapidly and making an important place in the heart of humans. For example, when internet connected things after connect with other devices, they make a big system which solve complex problems and make people life easie... see more

A Design Basis Threat was developed which was based on the threat the facility was exposed to in terms of its assets including the radioactive source. The purpose of this was to serve as a tool providing a common basis for planning for physical protection... see more

With the fast development in services related to localisation, location-based service (LBS) gains more importance amongst all the mobile wireless services. To avail the service in the LBS system, information about the location and identity of the user has... see more

It was well known from Shannon’s days that characteristics of the physical channel like attenuation, fadingand noise can impair reliable communication. But it was more recently that the beneficial side effects of channelcharacteristics in ensuring secret ... see more

The subject of the study is the analysis of the application of the Standard of Full Protection and Security of Foreign Investments in international arbitral practice. It is an absolute standard that is contained in almost all international investment agre... see more

Mobile Ad Hoc Network is a self-configurable and self-organizing wireless network of mobile devices without fixed infrastructure support, which makes it a good candidate as underlying communication network for the Cyber-Physical Systems in emergency condi... see more

1 of 4.358 pages  |  10  records  |  more records»