Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
521
Robust Malware identification via deep temporal convolutional network with symmetric cross entropy learning
Published 2023-08-01Subjects: Get full text
Article -
522
Effects of COVID-19 on pea farmers, a case study in the department of Nariño, Colombia
Published 2025-01-01Subjects: “…food security…”
Get full text
Article -
523
TPCM-based trusted PXE boot method for servers
Published 2020-12-01Subjects: “…information security…”
Get full text
Article -
524
Flow consistency in an intensive SDN security architecture with multiple controllers
Published 2017-12-01Subjects: Get full text
Article -
525
Research progress of abnormal user detection technology in social network
Published 2018-03-01Subjects: Get full text
Article -
526
Signaling in Minilaterals in the Indo-Pacific: The Cases of Quad and AUKUS (2017-2022)
Published 2024-12-01Subjects: Get full text
Article -
527
MARPUF: physical unclonable function with improved machine learning attack resistance
Published 2021-08-01Subjects: Get full text
Article -
528
Pakistan-Russia Relations within the Framework of the SCO: A Regional Analysis
Published 2025-01-01Subjects: Get full text
Article -
529
Multi-Slot Secure Offloading and Resource Management in VEC Networks: A Deep Reinforcement Learning-Based Method
Published 2025-01-01Subjects: Get full text
Article -
530
The India-US Security and Defense Cooperation under Narendra Modi: Challenges and Assessments
Published 2024-12-01Subjects: Get full text
Article -
531
Attention-based approach of detecting spam in social networks
Published 2020-02-01Subjects: Get full text
Article -
532
Deniable authentication for multi-party protocol
Published 2016-06-01Subjects: Get full text
Article -
533
User-habit based early warning of worm
Published 2006-01-01Subjects: “…network security…”
Get full text
Article -
534
5G MEC system security capability deployment scheme
Published 2022-11-01Subjects: Get full text
Article -
535
Interconnection and coexistence of heterogeneous network:requirements, challenges, and architecture
Published 2022-06-01Subjects: Get full text
Article -
536
Ensuring Security for the Participants of Criminal Proceedings: Forensic Aspects
Published 2020-12-01Subjects: Get full text
Article -
537
Survey on model inversion attack and defense in federated learning
Published 2023-11-01Subjects: Get full text
Article -
538
Security issues and system structure of internet of vehicles
Published 2016-02-01Subjects: Get full text
Article -
539
TECHNICAL EDUCATION AS A PANACEA FOR CURBING BANDITRY AND SECURITY CHALLENGES IN NORTHWEST NIGERIA
Published 2025-01-01Subjects: Get full text
Article -
540
Adaptive JPEG steganography based on distortion cost updating
Published 2017-09-01Subjects: “…information security…”
Get full text
Article