Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2341
Analysis of the implications of digital voting through neutrosophic Delphi modeling
Published 2024-11-01Subjects: Get full text
Article -
2342
-
2343
Global review of zucchini (Cucurbita pepo) pollination: research approaches, distribution of pollinators and knowledge gaps
Published 2025-01-01Subjects: Get full text
Article -
2344
Trusted digital rights management protocol supporting for time and space constraint
Published 2008-01-01Subjects: Get full text
Article -
2345
High resistance botnet based on smart contract
Published 2021-08-01Subjects: “…cyber security…”
Get full text
Article -
2346
-
2347
Research on active defense application based on honeypot
Published 2018-01-01Subjects: “…cyber security…”
Get full text
Article -
2348
Hardcoded vulnerability detection approach for IoT device firmware
Published 2022-10-01Subjects: Get full text
Article -
2349
Sandpiper optimization with hybrid deep learning model for blockchain-assisted intrusion detection in iot environment
Published 2025-01-01Subjects: Get full text
Article -
2350
KOPENHAG OKULU’NUN TOPLUMSAL GÜVENLİK KURAMI ÇERÇEVESİNDE TÜRKİYE’DEKİ PANDEMİ SÜRECİNİN DEĞERLENDİRİLMESİ
Published 2022-04-01Subjects: Get full text
Article -
2351
Türkiye’de Sosyal Güvenlik Sisteminin Ekonomik Etkileri: Sağlık Harcamaları veBüyümeİlişkisi Üzerine Ampirik Bir Çalışma
Published 2024-12-01Subjects: Get full text
Article -
2352
Selection of Candidates for Positions in Higher Education Institution from the Standpoint of Their Potential Loyalty to Employer
Published 2020-02-01Subjects: “…human security of university…”
Get full text
Article -
2353
SOME “EXOTIC” INFORMATION SOURCES THAT HAVE BEEN DISCOVERED DURING THE SELECTION OF SERIAL PUBLICATIONS TO SUPPORT RESEARCH IN ENERGY SECURITY, ENERGY CONSERVATION AND ENERGY EFFICIENCY TECHNOLOGIES AND TECHNIQUES: ADVANTAGEOUS ADDITION FOR “PROFESSIONAL READING” OF A POWER ENGINEERING EXPERT
Published 2018-04-01“…During the citation analysis-based selection of the world scientific serial publications apposite for a qualitative performance of research in energy security, energy conservation and energy efficient technologies and techniques with the use of the data of Journal Citation Reports® (which basic results are available at: https://figshare.com/articles/energy_sec_xlsx/5606053/2) a noticeable amount of non-serial items was also found out in addition to serial publications, as well as some publications that, though being serial, did not look typical to be used in the research activities. …”
Get full text
Article -
2354
Design and Implementation of a Binary Phase-Shift Keying Frequency Diverse Array: Considerations and Challenges
Published 2025-01-01Subjects: Get full text
Article -
2355
New remote authorization protocol for vehicle diagnosis
Published 2014-11-01Subjects: “…security protocol…”
Get full text
Article -
2356
Social Engineering Analysis Framework: A Comprehensive Playbook for Human Hacking
Published 2025-01-01Subjects: Get full text
Article -
2357
HARMONIZATION OF INDUSTRIAL AND TRADE POLICY OF THE ENTERPRISE
Published 2018-08-01Subjects: Get full text
Article -
2358
SliceScore: A Network Function Sharing Aware and Slice-Oriented DDoS Filtering Approach
Published 2025-01-01Subjects: Get full text
Article -
2359
Novel approach based on neighborhood relation signature against polymorphic internet worms
Published 2011-01-01Subjects: “…information security…”
Get full text
Article -
2360