Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
1861
Secrecy outage probability based access strategy for device-to-device communication underlaying cellular networks
Published 2016-08-01Subjects: Get full text
Article -
1862
Double Security Level Protection Based on Chaotic Maps and SVD for Medical Images
Published 2025-01-01Subjects: Get full text
Article -
1863
The Role of International Arbitration in Maintaining World Peace and Security with an Emphasis on Non- State Actors
Published 2024-03-01Subjects: “…world peace and security…”
Get full text
Article -
1864
Physical layer security of relay selection NOMA wireless systems
Published 2024-03-01Subjects: Get full text
Article -
1865
Privacy-preserving security of IoT networks: A comparative analysis of methods and applications
Published 2025-12-01Subjects: “…Privacy-preserving security…”
Get full text
Article -
1866
Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption
Published 2021-05-01Subjects: “…physical layer security…”
Get full text
Article -
1867
A Survey on Adversarial Attacks for Malware Analysis
Published 2025-01-01Subjects: Get full text
Article -
1868
Group-Based Authentication Methods in The OneM2M Ecosystem
Published 2022-12-01Subjects: Get full text
Article -
1869
On the problems of monitoring the shadow economy
Published 2022-04-01Subjects: Get full text
Article -
1870
Cooperative secret key generation for multi-hop relaying systems in Internet of things
Published 2018-03-01Subjects: “…physical layer security…”
Get full text
Article -
1871
Information security of minors: individual subjects of the Russian Federation organization experience
Published 2023-02-01Subjects: “…information security…”
Get full text
Article -
1872
Research on coreference resolution technology of entity in information security
Published 2020-02-01Subjects: Get full text
Article -
1873
Measuring Impunity in Latin America: Conceptual and Methodological Challenges
Published 2016-05-01Subjects: Get full text
Article -
1874
Аналіз функціонування систем управління державними інформаційними ресурсами
Published 2019-04-01Subjects: “…state information resources, information and telecommunication systems, cyberspace, vulnerabilities of information systems, security of state information resources.…”
Get full text
Article -
1875
VOLUNTEER MOVEMENT IN UKRAINE AS AN ELEMENT OF THE NATIONAL SECURITY SYSTEM: MODERNITY AND PROSPECTS
Published 2024-12-01Subjects: “…volunteer movement, national security of Ukraine, humanitarian aid, Armed Forces of Ukraine, social activism, national stability…”
Get full text
Article -
1876
SELECTION OF DEFINITION OF CORPORATE GOVERNANCE IN THE FORMATION OF THE ACCOUNTING INFORMATION SYSTEM
Published 2018-04-01Subjects: Get full text
Article -
1877
Ranking food security indicators and metrics in Hawaiʻi: a Delphi approach
Published 2025-01-01Subjects: “…food security…”
Get full text
Article -
1878
Russian authority and the Internet: safety vs freedom of speech
Published 2019-11-01Subjects: “…internet security…”
Get full text
Article -
1879
BEYOND DIRECT NUTRITION EDUCATION: THE GROWING IMPORTANCE OF POLICY, SYSTEMS, AND ENVIRONMENTAL CHANGE STRATEGIES IN THE USDA’S SNAP-ED PROGRAM
Published 2024-06-01Subjects: Get full text
Article -
1880
Research on the relationship between social support and academic self-efficacy among college students: a multivariate empirical analysis
Published 2025-02-01Subjects: Get full text
Article