scroll to top
0

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "BURGLARY protection"

1 - 10 of 2,465 results for
 "BURGLARY protection"
Results per page:

CHINA'S SOCIAL ASSISTANCE AND POVERTY REDUCTION POLICY: DEVELOPMENT, MAIN MEASURES, AND INSPIRATION TO GLOBAL POVERTY ALLEVIATION.

Publication Type: Academic Journal

Source(s): Revista Razon Critica. jul-dic2022, Issue 13, p79-98. 20p.

Authors:

Abstract: A política de assistência social e redução da pobreza da China é um requisito para diminuir a pobreza e satisfazer as necessidades básicas das pessoas que vivem na base da sociedade e não podem obter uma fonte de ingresso por seus próprios meios. Neste...

View details

Building Security Mechanisms for Cross-Border Business Customer Data Analysis Based on Smart Computing.

Publication Type: Academic Journal

Source(s): Mathematical Problems in Engineering. 3/22/2022, p1-10. 10p.

Authors:

Abstract: Dynamic social networks also suffer from privacy violation due to the continuous release of data. In order to defend against enemy attacks, a new dynamic privacy-preserving method is innovated, called Dynamic k w Re-Structured Diversity Anonymity ( k w...

View details

Building on health security capacities in Indonesia: Lessons learned from the COVID‐19 pandemic responses and challenges.

Publication Type: Academic Journal

Source(s): Zoonoses & Public Health. Sep2022, Vol. 69 Issue 6, p757-767. 11p.

Abstract: As an active member country of the WHO's International Health Regulation and Global Health Security Agenda, Indonesia, the world's fourth‐most populous and largest archipelagic country has recorded the second‐highest COVID‐19 cases in Asia with over 1....

View details

Effectiveness of integrated management of the buildings and structures security system.

Publication Type: Conference

Source(s): AIP Conference Proceedings. 8/17/2022, Vol. 2559 Issue 1, p1-6. 6p.

Abstract: The integrated security system is designed to ensure safety of the facility against anthropogenic, technogenic, natural and climatic threats. Environmentally sensitive design is the improvement of the environmental performance of a project, provided th...

View details

An Asset-Based Approach to Mitigate Zero-Day Ransomware Attacks.

Publication Type: Academic Journal

Source(s): Computers, Materials & Continua; 2022, Vol. 73 Issue 2, p3003-3020, 18p

Abstract: Copyright of Computers, Materials & Continua is the property of Tech Science Press and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may prin...

View details

Understanding Nascent Newsroom Security and Safety Cultures: The Emergence of the "Security Champion".

Publication Type: Academic Journal

Source(s): Journalism Practice; Nov2022, Vol. 16 Issue 9, p1829-1848, 20p, 1 Chart

Abstract: Copyright of Journalism Practice is the property of Routledge and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email...

View details

Why Bitcoin Will Fail to Scale?

Publication Type: Academic Journal

Source(s): Management Science; Oct2022, Vol. 68 Issue 10, p7323-7349, 27p, 1 Color Photograph, 13 Diagrams, 3 Charts, 7 Graphs

Abstract: Copyright of Management Science is the property of INFORMS: Institute for Operations Research and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, use...

View details

A security specific knowledge modelling approach for secure software engineering.

Publication Type: Academic Journal

Source(s): Journal of the National Science Foundation of Sri Lanka. Mar2020, Vol. 48 Issue 1, p93-98. 6p.

Abstract: The paradigm shift of 'Build Security In' has emerged in recent decades with the underpinning idea that software security has to be an integral part of all the phases of the software development lifecycle. As a result, each phase of the lifecycle is as...

View details

Voice spoofing countermeasure for voice replay attacks using deep learning.

Publication Type: Academic Journal

Source(s): Journal of Cloud Computing (2192-113X); 9/24/2022, Vol. 11 Issue 1, p1-14, 14p

Abstract: Copyright of Journal of Cloud Computing (2192-113X) is the property of Springer Nature and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may ...

View details
sponsored