Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2021
‘We are not trained to do clinical work’: security staff providing physical restraint for NGT feeding in English paediatric wards—a qualitative multi-informant study
Published 2024-12-01“…Objective To gain insights into the experience, and impact, of using security staff to facilitate physical restraints for nasogastric tube feeding.Design A cross-sectional design using 39 individual interviews, three online focus groups and three written submissions involving young people with lived experience (PWLE), parents/carers, paediatric staff and security staff involved in nasogastric feeding under restraint in paediatric settings in England. …”
Get full text
Article -
2022
-
2023
-
2024
-
2025
Food purchase patterns, food policy recognition, and food environment satisfaction among adults in Jeju, Korea, according to food security: a cross-sectional study
Published 2024-10-01Subjects: “…food security…”
Get full text
Article -
2026
-
2027
From pyramid to pillar : population change and social security in Europe.
Published 1989Subjects: “…Social security Europe. 10386…”
View in OPAC
Book -
2028
Methods of state support of real estate market and its classification
Published 2019-05-01Subjects: Get full text
Article -
2029
Privacy-preserving federated learning framework with irregular-majority users
Published 2022-02-01Subjects: Get full text
Article -
2030
APPLICATION OF ARTIFICIAL INTELLIGENCE FOR IMPROVING SITUATIONAL TRAINING OF CYBERSECURITY SPECIALISTS
Published 2023-10-01Subjects: Get full text
Article -
2031
Survey of capacity limits and implementation techniques in wireless covert communication
Published 2022-08-01Subjects: Get full text
Article -
2032
Human Security in Asia: Interrogating State, Society, and Policy, edited by Debasish Nandy, and Debtanu Majee....
Published 2024-12-01Subjects: Get full text
Article -
2033
Regionalismo y Seguridad Sudamericana: ¿son relevantes el Mercosur y la Unasur?
Published 2010-09-01Subjects: Get full text
Article -
2034
Brexit and the Future of the Special Relationship between the United States and the United Kingdom
Published 2020-11-01Subjects: Get full text
Article -
2035
The Evaluative Process Model of Objectification: how men's evaluations of patriarchal security and women's fit with conventional beauty and sexuality norms interact to predict perpetration of sexually objectifying behaviors
Published 2025-01-01“…Among men who endorse patriarchal ideologies, perceived patriarchy threat or security is theorized to interact with evaluations of female targets to predict whether objectifying perceptions of female targets result in benevolent, derogative, or dismissive objectifying behaviors. …”
Get full text
Article -
2036
A Scalable Approach to Internet of Things and Industrial Internet of Things Security: Evaluating Adaptive Self-Adjusting Memory K-Nearest Neighbor for Zero-Day Attack Detection
Published 2025-01-01“…This study confirms the feasibility of Adaptive SAMKNN as a real-time, scalable, and memory-efficient solution for IoT and IIoT security, providing reliable anomaly detection without overwhelming computational resources. …”
Get full text
Article -
2037
Research on Dual Security Control for a Non-Linear CPS with Multi-Objective Constraints under DoS Attack and Actuator Fault: An Active-Passive Attack-Tolerant Approach
Published 2022-01-01“…Second, a non-linear CPS dual security control framework that integrates active-passive attack tolerance for DoS attack and active fault tolerance for actuator fault is constructed. …”
Get full text
Article -
2038
Blockchain Applications in the Military Domain: A Systematic Review
Published 2025-01-01Subjects: Get full text
Article -
2039
Management of calls and threats in digital economy of Russia
Published 2018-06-01Subjects: Get full text
Article -
2040
Data access control policy of encrypted deduplication system
Published 2020-05-01Subjects: “…update of security policy…”
Get full text
Article