-
41
Machine vision technology,standardization,and application in safety industry
Published 2020-11-01Subjects: Get full text
Article -
42
Analysis of the use of digital technologies in state and municipal government
Published 2023-11-01Subjects: “…digitalization, digital technologies, public and municipal government, information security…”
Get full text
Article -
43
Construction and Application for Operation-BusinessOriented Mobile GIS Service Platform
Published 2015-06-01Subjects: Get full text
Article -
44
Evolution entropy risk assessment of ERP information security based on the business process
Published 2012-09-01Subjects: Get full text
Article -
45
Novel approach based on neighborhood relation signature against polymorphic internet worms
Published 2011-01-01Subjects: “…information security…”
Get full text
Article -
46
-
47
MANAGING FRAUD IN CONTEMPORARY BUSINESS ENVIRONMENT, THE ROLE OF INFORMATION SECURITY MANAGEMENT: A STUDY OF QUOTED DEPOSIT MONEY BANKS (DMBs) IN NIGERIA
Published 2024-05-01Subjects: “…information security management…”
Article -
48
Preparing the enterprise information environment for the digital economy
Published 2022-06-01Subjects: Get full text
Article -
49
-
50
Investigation of smart economic zone planning scheme
Published 2017-12-01Subjects: Get full text
Article -
51
Dynamic P2P trust model based on time-window feedback mechanism
Published 2010-01-01Subjects: “…information security…”
Get full text
Article -
52
Design of the Monitoring System for Communication Satellite Information Security Based on Spaceborne Network Probe
Published 2023-06-01Subjects: Get full text
Article -
53
Research on professional learning margin of university information security teachers in China
Published 2017-07-01Subjects: “…information security…”
Get full text
Article -
54
Research on color QR code watermarking technology based on chaos theory
Published 2018-07-01Subjects: “…information security…”
Get full text
Article -
55
HASHING ALGORITHM BASED ON TWO-DIMENSIONAL CHAOTIC MAPPINGS
Published 2017-08-01Subjects: Get full text
Article -
56
Document watermarking scheme for information tracking
Published 2008-01-01Subjects: “…information security…”
Get full text
Article -
57
Design and implementation of national security vulnerability database
Published 2011-01-01Subjects: “…information security…”
Get full text
Article -
58
Research on the game of information security investment based on the Gordon-Loeb model
Published 2018-02-01Subjects: “…information security investment…”
Get full text
Article -
59
Research on“Wo Connect”Uniform Authentication Technology
Published 2015-06-01Subjects: Get full text
Article -
60
Universally composable oblivious transfer protocol based on VSPH
Published 2007-01-01Subjects: “…information security…”
Get full text
Article