Suggested Topics within your search.
Suggested Topics within your search.
- English language 55
- Rhetoric 41
- History 31
- Report writing 30
- Management 25
- Grammar 23
- methods 22
- Law 21
- Moral and ethical aspects 18
- Research 18
- College readers 16
- Human anatomy 14
- Philosophy 13
- Handbooks, manuals, etc 12
- Methodology 12
- Problems, exercises, etc 12
- Social conditions 12
- Study and teaching 12
- Politics and government 11
- Academic writing 10
- Leadership 10
- Nursing 10
- Biochemistry 9
- Calculus 9
- Economic development 9
- Human physiology 9
- Mathematics 9
- Policy sciences 9
- Social aspects 9
- Anatomy 8
-
261
Author Correction: Thermophilic Hadarchaeota grow on long-chain alkanes in syntrophy with methanogens
Published 2025-01-01Get full text
Article -
262
Prevention of the Corruption Crime through Administrative Enforcement Mechanism against Abuse of Authority
Published 2024-12-01“…The law regulates that abuse of authority that results in state financial losses is a criminal offence of corruption. …”
Get full text
Article -
263
Author Correction: Prospective de novo drug design with deep interactome learning
Published 2025-01-01Get full text
Article -
264
ABOUT THE COMPOSITION AND NEUTRON ACTIVATION RADIOGRAPHY OF TOPAZ CRYSTALS FROM AN AUTHOR’S COLLECTION
Published 2024-09-01Get full text
Article -
265
FEATURES OF INFLUENCE OF PUBLIC AUTHORITIES ON CIVIL SOCIETY IN THE CONTEXT OF MANAGEMENT IN THE RUSSIAN FEDERATION
Published 2018-08-01Subjects: “…structures of public authority…”
Get full text
Article -
266
Author Correction: Automatic detection and counting of wheat spike based on DMseg-Count
Published 2025-02-01Get full text
Article -
267
Author Correction: Uncovering functional lncRNAs by scRNA-seq with ELATUS
Published 2025-01-01Get full text
Article -
268
Account hijacking threat attack detection for OAuth2.0 authorization API
Published 2019-06-01“…OAuth2.0 protocol has been widely adopted to simplify user login to third-party applications,at the same time,existing risk of leaking user privacy data,what even worse,causing user accounts to be hijacked.An account hijacking attack model around authorization code was built by analyzing the vulnerabilities of the OAuth2.0 protocol.A vulnerable API identification method based on differential traffic analysis and an account hijacking verification method based on authorized authentication traffic monitoring was proposed.An account hijacking attack threat detection framework OScan for OAuth2.0 authorization API was designed and implemented.Through a large-scale detection of the 3 853 authorization APIs deployed on the Alexa top 10 000 websites,360 vulnerable APIs were discovered.The further verification showed that 80 websites were found to have threat of account hijacking attack.Compared with similar tools,OScan has significant advantages in covering the number of identity provider,the number of detected relying party,as well as the integrity of risk detection.…”
Get full text
Article -
269
Author Correction: Pre-therapeutic efficacy of the CDK inhibitor dinaciclib in medulloblastoma cells
Published 2025-02-01Get full text
Article -
270
-
271
Multi-authority attribute-based encryption with efficient user revocation in cloud computing
Published 2016-02-01Subjects: Get full text
Article -
272
Development of the conceptual and terminological apparatus of warehousing logistics in the works of Russian and foreign authors
Published 2022-07-01“…The main approaches to the basic concepts of warehousing logistics in the works of russian and foreign authors are considered. the peculiarities of understanding the terms “warehouse”, “warehousing”, “warehousing system” are revealed. the main historical stages of the development of warehouses and storage facilities are reflected. based on the information provided, the following key features are highlighted: the warehouse is a complex system with its own interconnections and internal processes; a modern warehouse economy should be formed according to an optimized logistics system, of which it is a part, and be able to adapt to the slightest fluctuations and changes in this system; difficulties arising in the field of building a warehousing system can be solved with the help of a competently and clearly developed warehouse model based on the application of a logistics approach and the development of an adaptive warehouse management algorithm.…”
Get full text
Article -
273
Author Correction: IoT-based automated system for water-related disease prediction
Published 2025-01-01Get full text
Article -
274
-
275
Multi-authority attribute-based encryption access control model for cloud storage
Published 2015-06-01Subjects: Get full text
Article -
276
Community Agriculture Management in the Gayo Highlands: Integration of Customary and Local Government Authorities
Published 2024-10-01Subjects: Get full text
Article -
277
-
278
-
279
-
280
Back Matter (Acknowledgement & Index, Submission Guide, Author Guidelines, Subscription Form)
Published 2024-11-01Get full text
Article