Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
1121
Establishing scheme and algorithm for dynamic key-path of pair wise key for sensor networks
Published 2008-01-01Subjects: Get full text
Article -
1122
Problems of economic security management of the enterprises of the aviation industry
Published 2018-12-01Subjects: Get full text
Article -
1123
Efficiently non-authenticated group key management protocol withstand interruption attack
Published 2009-01-01Subjects: “…date and computer security…”
Get full text
Article -
1124
Defense and Security Mechanisms in the Internet of Things: A Review
Published 2025-01-01Subjects: Get full text
Article -
1125
Defense-enhanced dynamic heterogeneous redundancy architecture based on executor partition
Published 2021-03-01Subjects: Get full text
Article -
1126
DIGITAL SECURITY IN EDUCATIONAL TRAINING PROGRAMS: A STUDY BASED ON FUTURE TEACHERS’ PERCEPTIONS
Published 2023-06-01Subjects: Get full text
Article -
1127
Analisis Pengawasan Tentara Nasional Indonesia Angkatan Laut Terkait Ancaman Keamanan Perbatasan Laut Kabupaten Kepulauan Talaud, Filipina
Published 2024-12-01Subjects: “…maritime security…”
Get full text
Article -
1128
Analyzing critical success factors using blockchain based framework for intelligent transportation systems
Published 2025-01-01Subjects: Get full text
Article -
1129
Food loss in Pacific Island Countries: a scoping review of the literature
Published 2025-01-01Subjects: Get full text
Article -
1130
THE RUSSIAN’S DIGITAL SOVEREIGNTY AS A TECHNICAL BASIS OF INFORMATION SECURITY
Published 2016-12-01Subjects: Get full text
Article -
1131
Mobile malware traffic detection approach based on value-derivative GRU
Published 2020-01-01Subjects: “…network security…”
Get full text
Article -
1132
Friends mechanism-based routing intrusion detection model for mobile ad hoc network
Published 2015-11-01Subjects: Get full text
Article -
1133
Overview of the data security and privacy-preserving of mobile cloud services
Published 2013-12-01Subjects: Get full text
Article -
1134
Eco-imposition du capital, emploi et développement industriel durable
Published 2010-09-01Subjects: Get full text
Article -
1135
An Analysis of the Features of the Organisation of Tourist Activities in the Conditions of the War in Ukraine
Published 2024-12-01Subjects: Get full text
Article -
1136
-
1137
A network intrusion detection method designed for few-shot scenarios
Published 2023-10-01Subjects: Get full text
Article -
1138
PermGuard: A Scalable Framework for Android Malware Detection Using Permission-to-Exploitation Mapping
Published 2025-01-01Subjects: Get full text
Article -
1139
TURKEY’S SEARCH FOR SECURITY AND THE SOVIET FACTOR DURİNG THE SECOND WORLD W AR
Published 2014-05-01Subjects: “…turkey’s search ;for security ; the soviet factor duri̇ng the second world w ar…”
Get full text
Article -
1140
Efficient scheme for user's trajectory privacy
Published 2015-12-01Subjects: “…wireless network security…”
Get full text
Article