Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2181
Review of cloud based trust model
Published 2011-01-01Subjects: “…evaluate information security…”
Get full text
Article -
2182
USING COAL AS A PRESSURE INSTRUMENT OR ENERGY WEAPON
Published 2022-12-01Subjects: “…energy security…”
Get full text
Article -
2183
Plaider la « bonne gouvernance sécuritaire » au Maroc : Domestiquer les savoirs de réforme en régime de contrainte consensuelle
Published 2024-09-01Subjects: Get full text
Article -
2184
Quelques grammes d’histoire pour des tonnes de riz : produire plus suffira-t-il à éradiquer la faim dans le monde ?
Published 2008-11-01Subjects: Get full text
Article -
2185
IoT and Cloud Computing Issues, Challenges and Opportunities: A Review
Published 2021-03-01Subjects: “…Internet of Things, IoT, Cloud Computing, Privacy, Security.…”
Get full text
Article -
2186
Causes and optimization of the false alarm rate of code review system
Published 2020-12-01Subjects: Get full text
Article -
2187
Protocol for public opinion survey, Ecuador 2025
Published 2025-02-01Subjects: Get full text
Article -
2188
Strategic guidelines on the development of renewable energy sources
Published 2019-08-01Subjects: “…energy security…”
Get full text
Article -
2189
-
2190
Robust Malware identification via deep temporal convolutional network with symmetric cross entropy learning
Published 2023-08-01Subjects: Get full text
Article -
2191
Effects of COVID-19 on pea farmers, a case study in the department of Nariño, Colombia
Published 2025-01-01Subjects: “…food security…”
Get full text
Article -
2192
TPCM-based trusted PXE boot method for servers
Published 2020-12-01Subjects: “…information security…”
Get full text
Article -
2193
Research progress of abnormal user detection technology in social network
Published 2018-03-01Subjects: Get full text
Article -
2194
Signaling in Minilaterals in the Indo-Pacific: The Cases of Quad and AUKUS (2017-2022)
Published 2024-12-01Subjects: Get full text
Article -
2195
MARPUF: physical unclonable function with improved machine learning attack resistance
Published 2021-08-01Subjects: Get full text
Article -
2196
Pakistan-Russia Relations within the Framework of the SCO: A Regional Analysis
Published 2025-01-01Subjects: Get full text
Article -
2197
Attention-based approach of detecting spam in social networks
Published 2020-02-01Subjects: Get full text
Article -
2198
Deniable authentication for multi-party protocol
Published 2016-06-01Subjects: Get full text
Article -
2199
User-habit based early warning of worm
Published 2006-01-01Subjects: “…network security…”
Get full text
Article -
2200
Interconnection and coexistence of heterogeneous network:requirements, challenges, and architecture
Published 2022-06-01Subjects: Get full text
Article