Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
1601
Military security in the Arctic: New threats to Russia
Published 2024-11-01Subjects: Get full text
Article -
1602
Noise-Based Active Defense Strategy for Mitigating Eavesdropping Threats in Internet of Things Environments
Published 2024-12-01Subjects: Get full text
Article -
1603
Risks, threats, and vulnerabilities related to social media platforms and search engines. Regulations and national legal frameworks
Published 2025-01-01Subjects: Get full text
Article -
1604
Multidimensional evaluation of nutritional security policies in the Republic of Moldova: gaps, progress, and alignment with international standards
Published 2025-01-01Subjects: “…nutritional security…”
Get full text
Article -
1605
-
1606
Proper selection of personnel for the Security Service of Ukraine as a prerequisite for the career growth of its employees
Published 2023-09-01Subjects: Get full text
Article -
1607
Design and analysis of intelligent service chain system for network security resource pool
Published 2022-08-01Subjects: Get full text
Article -
1608
Research on Performance of Covert Wireless Communication over Uplink LEO Satellite-Terrestrial Network
Published 2024-12-01Subjects: Get full text
Article -
1609
Breeding for postharvest physiological deterioration in cassava: problems and strategies
Published 2022-05-01Subjects: Get full text
Article -
1610
-
1611
Public-private partnerships in National Security. A case study in the context of the war in Ukraine: 2022-2024
Published 2024-12-01Subjects: Get full text
Article -
1612
-
1613
FOOD AS A CRITICAL METAPHOR FOR GLOBALIZATION: SPAZIALIZATION OF TERRITORIAL IMBALANCES. EVIDENCE FROM THE GLOBAL SOUTH
Published 2024-12-01Subjects: Get full text
Article -
1614
Data fusion protocol with source security for sensor networks
Published 2010-01-01Subjects: Get full text
Article -
1615
Image Encryption Using Lorenz Chaotic System
Published 2023-03-01Subjects: “…Data Security…”
Get full text
Article -
1616
VDCM: A Data Collection Mechanism for Crowd Sensing in Vehicular Ad Hoc Networks
Published 2023-12-01Subjects: Get full text
Article -
1617
Sustainable alternative of palm wine analogue from different tiger nut milk-sugar syrup blends for local production
Published 2025-01-01Subjects: Get full text
Article -
1618
Theoretical Approaches to Nuclear Proliferation
Published 2015-08-01Subjects: Get full text
Article -
1619
-
1620
Cyber Threat Inference Focused on Threat Class Sequence With Threat Class Sequence System
Published 2025-01-01Subjects: Get full text
Article