Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
1561
Research on certificateless anonymous authentication and key agreement scheme of vehicle network based on CPN
Published 2024-06-01Subjects: Get full text
Article -
1562
Secure relay node selection method based on Q-learning for fog computing in 5G network
Published 2019-07-01Subjects: Get full text
Article -
1563
-
1564
ACTIVITIES OF INTERNATIONAL ORGANIZATIONS IN THE SPHERE OF PREVENTION AND LIMITATION OF EMERGENCY SITUATIONS IN THE ARCTIC REGION
Published 2024-07-01Subjects: Get full text
Article -
1565
Avrupa’nın Enerji Arz Güvenliği Açısından Yükselen Aktör: Romanya
Published 2015-10-01Subjects: Get full text
Article -
1566
Chaos Game Optimization with stacked LSTM sequence to sequence autoencoder for malware detection in IoT cloud environment
Published 2025-01-01Subjects: Get full text
Article -
1567
Balancing on carbon storage and ecological security in urban areas: The case of Dongguan city, China
Published 2025-06-01Subjects: Get full text
Article -
1568
Unimodal‐Bio‐GAN: Keyless biometric salting scheme based on generative adversarial network
Published 2021-11-01Subjects: Get full text
Article -
1569
CONCEPTUALIZATION OF THE INTERNATIONAL COOPERATION IN THE FIELD OF SCIENCE AND TECHNOLOGY
Published 2019-01-01Subjects: “…international information security…”
Get full text
Article -
1570
Modeling and Recognizing Policy Conflicts with Resource Access Requests on Protected Health Information
Published 2017-07-01Subjects: Get full text
Article -
1571
Digitalization of business increases the costs of information security
Published 2020-04-01Subjects: “…information security…”
Get full text
Article -
1572
Research on filter-based adversarial feature selection against evasion attacks
Published 2023-07-01Subjects: Get full text
Article -
1573
Optimizing Secure AI Lifecycle Model Management With Innovative Generative AI Strategies
Published 2025-01-01Subjects: Get full text
Article -
1574
Declining suitability for conversion of drylands to paddy fields in Northeast China: Impact of future climate and socio-economic changes
Published 2025-02-01Subjects: Get full text
Article -
1575
On the Performance of Energy Harvesting Dual-Hop Free-Space Optical Communication Systems with Secrecy Analysis
Published 2025-01-01Subjects: Get full text
Article -
1576
Researcb on Application Bidirectional Identity Autbentication Scbeme Based on Mobile Pbone Token
Published 2014-09-01Subjects: Get full text
Article -
1577
Study on the destination selection methods in router-level Internet topology measurement
Published 2006-01-01Subjects: “…information security…”
Get full text
Article -
1578
Cooperative interference power allocation in physical layer security under imperfect time synchronization
Published 2019-11-01Subjects: “…physical layer security…”
Get full text
Article -
1579
Effective Safety and Security Measures in the Prevention of Various Crimes in Selected Ordinary, Public Secondary Schools: A Participatory Framework Approach
Published 2024-12-01Subjects: “…safety and security…”
Get full text
Article -
1580
Provable secure trusted protocol for network storage
Published 2011-01-01Subjects: “…provable security…”
Get full text
Article