Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2541
Establishing scheme and algorithm for dynamic key-path of pair wise key for sensor networks
Published 2008-01-01Subjects: Get full text
Article -
2542
Efficiently non-authenticated group key management protocol withstand interruption attack
Published 2009-01-01Subjects: “…date and computer security…”
Get full text
Article -
2543
Defense-enhanced dynamic heterogeneous redundancy architecture based on executor partition
Published 2021-03-01Subjects: Get full text
Article -
2544
Analisis Pengawasan Tentara Nasional Indonesia Angkatan Laut Terkait Ancaman Keamanan Perbatasan Laut Kabupaten Kepulauan Talaud, Filipina
Published 2024-12-01Subjects: “…maritime security…”
Get full text
Article -
2545
Analyzing critical success factors using blockchain based framework for intelligent transportation systems
Published 2025-01-01Subjects: Get full text
Article -
2546
Survey on privacy protection in non-aggregated data sharing
Published 2021-06-01Subjects: Get full text
Article -
2547
Food loss in Pacific Island Countries: a scoping review of the literature
Published 2025-01-01Subjects: Get full text
Article -
2548
Mobile malware traffic detection approach based on value-derivative GRU
Published 2020-01-01Subjects: “…network security…”
Get full text
Article -
2549
Friends mechanism-based routing intrusion detection model for mobile ad hoc network
Published 2015-11-01Subjects: Get full text
Article -
2550
Eco-imposition du capital, emploi et développement industriel durable
Published 2010-09-01Subjects: Get full text
Article -
2551
An Analysis of the Features of the Organisation of Tourist Activities in the Conditions of the War in Ukraine
Published 2024-12-01Subjects: Get full text
Article -
2552
-
2553
A network intrusion detection method designed for few-shot scenarios
Published 2023-10-01Subjects: Get full text
Article -
2554
Research and application of 5G lightweight hardware encryption module for power terminals
Published 2023-06-01Subjects: Get full text
Article -
2555
PermGuard: A Scalable Framework for Android Malware Detection Using Permission-to-Exploitation Mapping
Published 2025-01-01Subjects: Get full text
Article -
2556
Efficient scheme for user's trajectory privacy
Published 2015-12-01Subjects: “…wireless network security…”
Get full text
Article -
2557
Stealthy data poisoning attack method on offline reinforcement learning in unmanned systems
Published 2024-12-01Subjects: Get full text
Article -
2558
Normative Provision of Personal Safety of the Employees of the National Police of Ukraine
Published 2020-12-01Subjects: “…security…”
Get full text
Article -
2559
Research on malicious code variants detection based on texture fingerprint
Published 2014-08-01Subjects: “…network security…”
Get full text
Article -
2560
Method for determining the lengths of protocol keywords based on maximum likelihood probability
Published 2016-06-01Subjects: Get full text
Article