Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2401
Time based incremental backup scheme for mobile cloud computing
Published 2016-08-01Subjects: Get full text
Article -
2402
Modeling and countermeasures of a social network-based botnet with strong destroy-resistance
Published 2017-01-01Subjects: “…network security…”
Get full text
Article -
2403
Quantum Key Distribution Applicability to Smart Grid Cybersecurity Systems
Published 2025-01-01Subjects: “…Smart grid security…”
Get full text
Article -
2404
“Shoot Against the Waves”: Securitization and Militarization of Natural Disasters and Humanitarian Help in Latin America
Published 2019-05-01Subjects: Get full text
Article -
2405
Classified risk assessment method of Android application based on multi-factor clustering selection
Published 2021-04-01Subjects: Get full text
Article -
2406
The Global Assessment of Oilseed Brassica Crop Species Yield, Yield Stability and the Underlying Genetics
Published 2022-10-01Subjects: Get full text
Article -
2407
Dynamic P2P trust model based on time-window feedback mechanism
Published 2010-01-01Subjects: “…information security…”
Get full text
Article -
2408
Exploring the talent training mode of“cybersecurity doctor”
Published 2019-06-01Subjects: Get full text
Article -
2409
A Lightweight Mitigation Technique Against a Modified Version Number Attack in IoT Networks
Published 2025-01-01Subjects: Get full text
Article -
2410
Mistaken Worlds: When “Abundance” and “Scarcity” Collide in the Colombian Amazon
Published 2016-01-01Subjects: Get full text
Article -
2411
Meta-analysis of water stress impact on rice quality in China
Published 2025-02-01Subjects: Get full text
Article -
2412
Survey of data possession provability proving on cloud storage
Published 2012-11-01Subjects: Get full text
Article -
2413
The New Anti-Terrorism Act of the Philippines and Its Conflict with the International Human Rights System
Published 2024-03-01Subjects: Get full text
Article -
2414
Les politiques agricoles de l'Indonésie et de la Malaisie face aux impératifs de la sécurité alimentaire
Published 2014-05-01Subjects: Get full text
Article -
2415
Vulnerability detection method for blockchain smart contracts based on metamorphic testing
Published 2023-10-01Subjects: Get full text
Article -
2416
A comparison of several intrusion detection methods using the NSL-KDD dataset
Published 2024-06-01Subjects: “…Cyber Security…”
Get full text
Article -
2417
The EU-Azerbaijan Relations in the Gas Transporting Sector
Published 2022-11-01Subjects: Get full text
Article -
2418
Research on color QR code watermarking technology based on chaos theory
Published 2018-07-01Subjects: “…information security…”
Get full text
Article -
2419
Cloud-Based Transaction Fraud Detection: An In-depth Analysis of ML Algorithms
Published 2024-06-01Subjects: “…Cloud-Security, Fraud-Detection, Fraud-Transaction, ML, Evaluation, Performance.…”
Get full text
Article -
2420
Transport Corridors in the Russian Integration Projects, the Case of the Eurasian Economic Union
Published 2015-02-01Subjects: Get full text
Article