Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
1701
A Lost Opportunity : The Flawed Implementation of Assertive Multilateralism (1991-1993)
Published 2012-12-01Subjects: Get full text
Article -
1702
Method for Information Security Events Detection in a Cloud Signature Systems
Published 2024-06-01Subjects: Get full text
Article -
1703
-
1704
COMPARATIVE ANALYSIS OF INVESTMENT EXPENDITURES IN BUDGETS: REGIONAL ASPECT
Published 2020-06-01Subjects: Get full text
Article -
1705
TRANSFORMATION OF PUBLIC PROCUREMENT OF INDUSTRIAL PRODUCTS TAKING INTO ACCOUNT THE ENVIRONMENTAL FACTOR
Published 2020-09-01Subjects: Get full text
Article -
1706
Iron Brothers: The Strategic Bond between China and Pakistan
Published 2024-12-01Subjects: Get full text
Article -
1707
La construction du Maghreb au défi du partenariat euro-méditerranéen de l’Union européenne
Published 2013-10-01Subjects: Get full text
Article -
1708
Risk assessment method for network attack surface based on Bayesian attack graph
Published 2018-06-01Subjects: Get full text
Article -
1709
Secret level valuation method of BLP model based on some application properties
Published 2013-09-01Subjects: “…information security…”
Get full text
Article -
1710
Analysis of physical layer secret key capacity in the uniform scattering environment
Published 2016-09-01Subjects: “…physical layer security…”
Get full text
Article -
1711
SOME RESULTS OF REFORM OF THE SOCIAL SPHERE OF THE RUSSIAN FEDERATION
Published 2019-05-01Subjects: Get full text
Article -
1712
THE INTERNATIONAL CONFERENCE ON SYRIA (“GENEVA-2”): DIFFICULTIES OF INTER-SYRIAN TALKS AND ROLE OF FOREIGN PLAYERS
Published 2013-10-01Subjects: Get full text
Article -
1713
New signcryption algorithm for secure communication of ad hoc networks
Published 2010-01-01Subjects: Get full text
Article -
1714
Design and application research on management information system security architecture in digital campus
Published 2014-10-01Subjects: Get full text
Article -
1715
Network security threat warning method based on qualitative differential game
Published 2018-08-01Subjects: “…network security threat…”
Get full text
Article -
1716
PCA and PSO based optimized support vector machine for efficient intrusion detection in internet of things
Published 2025-02-01Subjects: Get full text
Article -
1717
A study on the impact of accounting information security controls on the effectiveness of internal controls in Vietnamese enterprises
Published 2025-03-01Subjects: “…Accounting information security…”
Get full text
Article -
1718
Peculiarities of procedural decision-making during pre-trial investigation of high-profile offences a sexual nature committed against children
Published 2023-07-01Subjects: Get full text
Article -
1719
The Concept and Essence of Administrative and Legal Protection of Tax Relations
Published 2019-09-01Subjects: “…administrative and legal security…”
Get full text
Article -
1720
Adaptively secure key-policy ABE scheme with fast decryption
Published 2014-11-01Subjects: Get full text
Article