Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
1401
Efficient chosen-ciphertext secure proxy re-encryption scheme
Published 2013-07-01Subjects: Get full text
Article -
1402
Optimal relay selection scheme and outage probability analysis in cooperative wireless networks
Published 2018-11-01Subjects: “…physical layer security…”
Get full text
Article -
1403
WLAN Mesh security association scheme in trusted computing environment
Published 2014-07-01Subjects: Get full text
Article -
1404
Intrusion detection model based on non-symmetric convolution auto-encode and support vector machine
Published 2018-11-01Subjects: Get full text
Article -
1405
Women empowerment, efficiency and food security nexus in rural Ethiopia: A generalized structural equation modeling
Published 2025-01-01Subjects: Get full text
Article -
1406
Multi‐data classification detection in smart grid under false data injection attack based on Inception network
Published 2024-10-01Subjects: Get full text
Article -
1407
Research and design in dual network scheme of power corporation based on network isolation and secure data exchange
Published 2017-02-01Subjects: Get full text
Article -
1408
A Novel Authentication Management for the Data Security of Smart Grid
Published 2024-01-01Subjects: Get full text
Article -
1409
Genesis of social security regulation for police officers in Ukraine
Published 2023-07-01Subjects: Get full text
Article -
1410
Transforming global governance: Crafting sustainable peace through Global South perspectives
Published 2024-12-01Subjects: Get full text
Article -
1411
Review of community development initiatives for poverty reduction in Southern Africa
Published 2024-08-01Subjects: Get full text
Article -
1412
-
1413
Self-corrected coefficient smoothing method based network security situation prediction
Published 2020-05-01Subjects: “…security situation…”
Get full text
Article -
1414
Service security monitoring mechanism for application server cluster
Published 2016-06-01Subjects: Get full text
Article -
1415
Research progress on cloud data assured deletion based on cryptography
Published 2016-08-01Subjects: “…cloud data security…”
Get full text
Article -
1416
Network protocol identification based on active learning and SVM algorithm
Published 2013-10-01Subjects: “…network security…”
Get full text
Article -
1417
Construction of the ecological security pattern of Mu Us sandy land on the basis of the “Source − Resistance − Corridor” theory
Published 2025-02-01Subjects: “…Ecological Security Pattern…”
Get full text
Article -
1418
Provable security signcryption scheme based on RLWE without trapdoor
Published 2020-06-01Subjects: Get full text
Article -
1419
Relations on Ensuring the Rights and Freedoms of a Man and Citizen as a Component of the Subject Matter of Administrative Law
Published 2020-09-01Subjects: Get full text
Article -
1420
Urban farming: the challenges of hydroponic and vertical farming in Malaysia
Published 2025-12-01Subjects: Get full text
Article