Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2741
Business in Ecological Sphere: it's Role in World Politics
Published 2013-06-01Subjects: “…national security…”
Get full text
Article -
2742
Research on performance optimizations for TCM-KNN network anomaly detection algorithm
Published 2009-01-01Subjects: “…network security…”
Get full text
Article -
2743
Dynamics, vulnerabilities and prospects of the Colombian-Venezuelan border
Published 2021-05-01Subjects: Get full text
Article -
2744
Truthful incentive mechanism for “digital currency”based on privacy protection
Published 2019-04-01Subjects: Get full text
Article -
2745
Network anomaly detection based on TCM-KNN and genetic algorithm
Published 2007-01-01Subjects: “…network security…”
Get full text
Article -
2746
International Experience of Organizing Cooperation between police and Public
Published 2020-12-01Subjects: Get full text
Article -
2747
Belarus’ Sovereignty in Question: Assessing its de facto Sovereign Status in the Shadow of Russia
Published 2024-06-01Subjects: Get full text
Article -
2748
MACHINE LEARNING AS A CORPORATION'S TOOL FOR SELECTION OF SUPPLIERS
Published 2019-10-01Subjects: Get full text
Article -
2749
Tracking illegal activities using video surveillance systems: a review of the current state of research
Published 2024-03-01Subjects: Get full text
Article -
2750
Threshold ring signature for wireless sensor networks
Published 2012-03-01Subjects: Get full text
Article -
2751
Network intrusion intention analysis model based on Bayesian attack graph
Published 2020-09-01Subjects: Get full text
Article -
2752
Recent advances in organic fluorophores as anti-counterfeit agents: an up-to-date review
Published 2025-01-01Subjects: Get full text
Article -
2753
Wireless quantum power distribution system based on wireless
Published 2020-02-01Subjects: “…quantum secure communication…”
Get full text
Article -
2754
Survey of optical-based physical domain adversarial attacks and defense
Published 2024-04-01Subjects: Get full text
Article -
2755
Interestmeasurement and system construction of personal information protectionLI Meiyan
Published 2018-08-01Subjects: Get full text
Article -
2756
Modernization of the mechanism of the financial services market cybersecurity legal support
Published 2021-09-01Subjects: Get full text
Article -
2757
LEGAL ANALYSIS OF TARGETING AS A BASIS FOR THE PROVISION OF SOCIAL ASSISTANCE
Published 2024-05-01Subjects: “…poverty alleviation, targeting, social security, social benefits, inequality in society, sustainable development.…”
Get full text
Article -
2758
Synergetic Paradigm of Geopolitical Confrontation in the Postmodern Era
Published 2014-08-01Subjects: Get full text
Article -
2759
The concept of peace and victory in the domestic and foreign policy of Ukraine
Published 2023-04-01Subjects: Get full text
Article -
2760