Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
2041
Secure Satellite Downlink With Hybrid RIS and AI-Based Optimization
Published 2025-01-01Subjects: Get full text
Article -
2042
To the Question on the Nature of Military Threats and Non-Military Responses
Published 2015-04-01Subjects: “…national security…”
Get full text
Article -
2043
The History of the Expansion of the North Atlantic Alliance in the 1990s as an Open-Ended-Story
Published 2023-03-01Subjects: Get full text
Article -
2044
Development of multi-agent information security management system
Published 2022-12-01Subjects: “…information security management systems…”
Get full text
Article -
2045
Selected Topics on Information Management in Complex Systems: Editorial Introduction to Issue 24 of CSIMQ
Published 2020-10-01Subjects: Get full text
Article -
2046
«Conceptually, we should write not about how we won, but about how we fought on a long journey and through losses came to the Great Victory...»
Published 2021-12-01Subjects: Get full text
Article -
2047
-
2048
Using RES Surpluses to Remove Overburden from Lignite Mines Can Improve the Nation’s Energy Security
Published 2024-12-01Subjects: Get full text
Article -
2049
R~2BAC:a risk-based multi-domain secure interoperation model
Published 2008-01-01Subjects: Get full text
Article -
2050
Secure RSSI-based node positioning mechanism for wireless sensor networks
Published 2012-07-01Subjects: Get full text
Article -
2051
Synchronization of hyperchaos of cellular neural network with applications to secure communication
Published 2000-01-01Subjects: Get full text
Article -
2052
Lightweight and secure vehicle track verification scheme via broadcast communication channels
Published 2023-10-01Subjects: Get full text
Article -
2053
HIPSCS:secure IP communication system based on HIP
Published 2012-11-01Subjects: Get full text
Article -
2054
Developing an Intelligent System for Efficient Botnet Detection in IoT Environment
Published 2025-04-01Subjects: Get full text
Article -
2055
Analysis on the status and development of quantum secure communication standardization
Published 2018-01-01Subjects: Get full text
Article -
2056
FEATURES OF FORMATION AND DEVELOPMENT OF THE COMMON MARKET OF MORTGAGE LENDING IN THE EUROPEAN UNION
Published 2016-10-01Subjects: Get full text
Article -
2057
-
2058
TO A QUESTION OF DEVELOPMENT OF THE MAIN DIRECTIONS OF OPTIMUM POLICY OF BANK
Published 2017-03-01Subjects: “…portfolio of securities…”
Get full text
Article -
2059
Reconstruction of BLP model based on secure subject access
Published 2007-01-01Subjects: Get full text
Article -
2060
Resource optimization of secure energy efficiency based on mmWave massive MIMO-NOMA system with SWIPT
Published 2020-08-01Subjects: Get full text
Article