Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
321
Spatialities of Family and Care in Contexts of (In)Securitized Migration: The Case of Hindered Parenting among Seasonal Workers in Switzerland
Published 2024-07-01Subjects: Get full text
Article -
322
Selfish mining detection scheme based on the characters of transactions
Published 2023-04-01Subjects: Get full text
Article -
323
Safe communicated model of SIP network based on improved SIP protocol
Published 2007-01-01Subjects: “…network security…”
Get full text
Article -
324
-
325
Power PTN security comprehensive evaluation based on power application
Published 2015-12-01Subjects: Get full text
Article -
326
Real-time Defense Against Cyber Threats: Analyzing Wazuh's Effectiveness in Server Monitoring
Published 2023-09-01Subjects: Get full text
Article -
327
The Criminological Roles and Effects on Peace, Safety and Security in South Africa
Published 2024-12-01Subjects: Get full text
Article -
328
<span style="font-variant: small-caps">Ventinel</span>: Automated Detection of Android Vishing Apps Using Optical Character Recognition
Published 2025-01-01Subjects: Get full text
Article -
329
Inteligência territorial e análise de recursos hídricos: apontamentos teórico-metodológicos aplicados ao diagnóstico e prognóstico do PSH
Published 2023-10-01Subjects: Get full text
Article -
330
Research and applications of intelligent public security information system based on big data
Published 2016-12-01Subjects: Get full text
Article -
331
Application of generative adversarial networks for financial data
Published 2024-06-01Subjects: Get full text
Article -
332
Discussions on the talent cultivation of cyber security
Published 2016-02-01Subjects: “…cyber security…”
Get full text
Article -
333
CHURCH RESPONSE TO SECURITY CHALLENGES IN THE 21ST CENTURY: THE NIGERIAN EXPERIENCE
Published 2023-07-01Subjects: Get full text
Article -
334
RANCANG BANGUN ALAT PELATIHAN PARKIR MOBIL BERBASIS MIKROKONTROLER
Published 2024-10-01Subjects: “…parking, microcontroller, ultrasonic sensor, security, LCD…”
Get full text
Article -
335
The security system of the Republic of Serbia: The character and value of knowledge in its products
Published 2024-01-01Subjects: “…security system…”
Get full text
Article -
336
Automatic Verification Analysis Technology of Network Security Domain
Published 2015-01-01Subjects: “…security domain…”
Get full text
Article -
337
Anomaly detection in backbone networks using Filter-ary-Sketch
Published 2011-01-01Subjects: “…network security…”
Get full text
Article -
338
ADDRESSING DESERTIFICATION TO PROMOTE SUSTAINABLE PEACE BETWEEN FARMERS AND HERDSMEN IN NIGERIA
Published 2023-09-01Subjects: Get full text
Article -
339
Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities
Published 2025-01-01Subjects: Get full text
Article -
340
Lightweight Models for Real-Time Steganalysis: A Comparison of MobileNet, ShuffleNet, and EfficientNet
Published 2024-12-01Subjects: Get full text
Article