Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
821
Novel approach based on neighborhood relation signature against polymorphic internet worms
Published 2011-01-01Subjects: “…information security…”
Get full text
Article -
822
-
823
-
824
Secure control plane for SDN using Bayesian Stackelberg games
Published 2017-11-01Subjects: Get full text
Article -
825
A robust scheme for securing relational data incremental watermarking
Published 2025-06-01Subjects: Get full text
Article -
826
PROBLEMS OF DIGITAL TRANSFORMATION OF UKRAINIAN CORPORATE MEDIA
Published 2024-12-01Subjects: Get full text
Article -
827
Analysis on Mobile Internet Application Security Issues Based on the Cloud Computing Mode
Published 2013-03-01Subjects: Get full text
Article -
828
The Role of Pension Funds in Financing US Federal Debt
Published 2017-03-01Subjects: Get full text
Article -
829
Secure federated learning scheme based on adaptive Byzantine defense
Published 2024-08-01Subjects: Get full text
Article -
830
MANAGING FRAUD IN CONTEMPORARY BUSINESS ENVIRONMENT, THE ROLE OF INFORMATION SECURITY MANAGEMENT: A STUDY OF QUOTED DEPOSIT MONEY BANKS (DMBs) IN NIGERIA
Published 2024-05-01Subjects: “…information security management…”
Article -
831
Research on technology of data encryption and search based on access broker
Published 2018-07-01Subjects: “…cloud security…”
Get full text
Article -
832
TCCL:secure and efficient development of desktop cloud structure
Published 2017-10-01Subjects: Get full text
Article -
833
Distributed trust model based on parameter modeling
Published 2013-04-01Subjects: “…network security…”
Get full text
Article -
834
Design and implementation of low-cost hardware architecture for authentication encryption algorithm SM4-GCM
Published 2023-12-01Subjects: Get full text
Article -
835
Heterogeneous redundancies scheduling algorithm for mimic security defense
Published 2018-07-01Subjects: “…mimic security defense…”
Get full text
Article -
836
The Impact of Digital Technologies on the Development of Payment Services
Published 2020-10-01Subjects: Get full text
Article -
837
Collaborative security assessment of cloud-edge-device distributed systems based on order parameters
Published 2024-06-01Subjects: Get full text
Article -
838
Resolving Covid-19 with Blockchain and AI
Published 2024-06-01Subjects: “…security…”
Get full text
Article -
839
Babacan Liderlik ve İşte Var Olamama İlişkisinde İş Güvencesinin Aracı Rolü
Published 2019-02-01Subjects: Get full text
Article -
840
Equipment network management security of electrical power PTN
Published 2015-12-01Subjects: Get full text
Article