Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2441
Development of the risk management system of the enterprises - aviation equipment lifecycle participants
Published 2018-06-01Subjects: Get full text
Article -
2442
SUPPORT VECTOR MACHINE FOR HUMAN IDENTIFICATION BASED ON NON-FIDUCIAL FEATURES OF THE ECG
Published 2023-05-01Subjects: “…biometrics, hidden biometrics, security, identification, ECG, machine learning, SVM…”
Get full text
Article -
2443
Document watermarking scheme for information tracking
Published 2008-01-01Subjects: “…information security…”
Get full text
Article -
2444
Internet worm propagation model based on Markov chain
Published 2015-05-01Subjects: “…network security…”
Get full text
Article -
2445
Efficient signcryption scheme based on Cocks’ identity cryptosystem
Published 2020-12-01Subjects: Get full text
Article -
2446
Software diversity evaluating method based on gadget feature analysis
Published 2023-06-01Subjects: Get full text
Article -
2447
Application of Interactive Multi-Biometrics Recognition on E-Commerce
Published 2015-10-01Subjects: “…security…”
Get full text
Article -
2448
-
2449
Blockchain-based result-traceable searchable encryption scheme
Published 2019-09-01Subjects: Get full text
Article -
2450
Research on“Wo Connect”Uniform Authentication Technology
Published 2015-06-01Subjects: Get full text
Article -
2451
Universally composable oblivious transfer protocol based on VSPH
Published 2007-01-01Subjects: “…information security…”
Get full text
Article -
2452
RISK MANAGEMENT OF THE DEVELOPMENT OF FINANCIAL POTENTIAL OF BUSINESS ENTITIES
Published 2023-10-01Subjects: Get full text
Article -
2453
Governing the boundary: between socio-environmental vulnerability and state capacity in Temajuk Village, Indonesia
Published 2025-01-01Subjects: “…national security…”
Get full text
Article -
2454
The protection of “state overseas interests” in China’s foreign policy strategy: conceptual, legal and expert dimensions of the discussion
Published 2024-12-01Subjects: Get full text
Article -
2455
Forms of Interaction of the National Police with the Public in the Field of Ensuring Public Safety and Order
Published 2020-09-01Subjects: “…public order and security…”
Get full text
Article -
2456
-
2457
A Simple Approach for Mitigating a New Flooding Attack in RPL-Based IoT Networks
Published 2025-01-01Subjects: Get full text
Article -
2458
Research on a Mobile Malicious Code Management and Control Method Based on Cloud-Pipeline-Terminal
Published 2013-08-01Subjects: Get full text
Article -
2459
SDN TCP-SYN Dataset: A dataset for TCP-SYN flood DDoS attack detection in software-defined networksMendeley Data
Published 2025-04-01Subjects: Get full text
Article -
2460
Performance evaluation of the SM4 cipher based on field‐programmable gate array implementation
Published 2021-03-01Subjects: Get full text
Article