Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2241
Research on OLE object vulnerability analysis for RTF file
Published 2016-01-01Subjects: Get full text
Article -
2242
Agriculture urbaine comme réponse au chômage à Kinshasa, République Démocratique du Congo
Published 2011-05-01Subjects: Get full text
Article -
2243
Research and practice of SRv6 for integrated carrying of video cloud
Published 2019-12-01Subjects: Get full text
Article -
2244
SOCIAL PROTECTION IN THE CONTEXT OF CLIMATE CHANGE
Published 2024-12-01Subjects: Get full text
Article -
2245
Constitute the passive infrastructure in network
Published 2003-01-01Subjects: “…network security…”
Get full text
Article -
2246
Design and implement of integrative access layer in campus network
Published 2014-10-01Subjects: Get full text
Article -
2247
DeepRD:LSTM-based Siamese network for Android repackaged applications detection
Published 2018-08-01Subjects: Get full text
Article -
2248
-
2249
Automated configuration,simulation and verification platform for event-driven home automation IoT system
Published 2019-09-01Subjects: Get full text
Article -
2250
Research on dynamic cooperative technology of manned and unmanned networked information system
Published 2023-07-01Subjects: Get full text
Article -
2251
Privacy-preserving trajectory similarity computation method
Published 2022-11-01Subjects: Get full text
Article -
2252
Visualization analysis and design of DDoS attack
Published 2017-02-01Subjects: “…network security…”
Get full text
Article -
2253
Model typowania sprawców zamachów z wykorzystaniem bojowych środków chemicznych
Published 2023-04-01Subjects: Get full text
Article -
2254
Pumpkin and watermelon production constraints and management practices in Uganda
Published 2022-06-01Subjects: Get full text
Article -
2255
User authentication scheme based on the ElGamal signature for mobile communication system
Published 2005-01-01Subjects: Get full text
Article -
2256
Research on quantitative assessment model on vulnerability risk for information system
Published 2009-01-01Subjects: Get full text
Article -
2257
Exploring the Potential of Blockchain Technology in an IoT-Enabled Environment: A Review
Published 2024-01-01Subjects: Get full text
Article -
2258
Trusted fuzzy routing scheme in flying ad-hoc network
Published 2024-03-01Subjects: “…security…”
Get full text
Article -
2259
Accelerated traffic replay method based on time compression
Published 2021-10-01Subjects: “…cyber security…”
Get full text
Article -
2260
Privacy-preserving image processing in cloud computing
Published 2016-01-01Subjects: Get full text
Article