Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3241
Formation of the TNI Cyber Force: A Strategic and Policy Analysis
Published 2024-11-01“…Defense and Security Studies…”
Get full text
Article -
3242
CRISPR/Cas9 mutagenesis reveals an essential role of PI4KB in promoting growth and resisting hemorrhagic disease caused by GCRV-II infection in juvenile grass carp
Published 2025-01-01“…Water Biology and Security…”
Get full text
Article -
3243
Jervis Robert: How Statesmen Think: The Psychology of International Politics, Princeton University Press, Princeton, 2017
Published 2024-01-01“…Journal of Regional Security…”
Get full text
Article -
3244
ЛАНДШАФТ ЗАНЯТОСТИ ПРЕПОДАВАТЕЛЕЙ ВУЗА: КЕЙС УФИМСКОГО УНИВЕРСИТЕТА НАУКИ И ТЕХНОЛОГИЙ
Published 2025-02-01“…Society and Security Insights…”
Get full text
Article -
3245
Improved lattice‐based mix‐nets for electronic voting
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
3246
Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited
Published 2022-01-01“…IET Information Security…”
Get full text
Article -
3247
ПРОБЛЕМЫ ПЛАНИРОВАНИЯ РАЦИОНОВ ШКОЛЬНОГО ПИТАНИЯ НА ПРИМЕРЕ СОЦИОЛОГИЧЕСКОГО ИССЛЕДОВАНИЯ В РЕСПУБЛИКЕ БАШКОРТОСТАН...
Published 2025-02-01“…Society and Security Insights…”
Get full text
Article -
3248
Optimized SM4 Hardware Implementations for Low Area Consumption
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
3249
Research on the problem of landmines and explosive remnants of war worldwide and methods of demining
Published 2024-11-01“…Defense and Security Studies…”
Get full text
Article -
3250
An analysis of the current and potential market opportunities for hempseed and fibre: the case of Scotland?
Published 2025-01-01“…Agriculture & Food Security…”
Get full text
Article -
3251
Stealth conflicts: Unpacking the causes of underreported and invisible wars
Published 2024-01-01“…Journal of Regional Security…”
Get full text
Article -
3252
Reversible data hiding in encrypted images with high payload
Published 2022-07-01“…IET Information Security…”
Get full text
Article -
3253
Inner-Product Matchmaking Encryption: Bilateral Access Control and Beyond Equality
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
3254
Comment on ‘Targeted Ciphers for Format‐Preserving Encryption’ from Selected Areas in Cryptography 2018
Published 2021-09-01“…IET Information Security…”
Get full text
Article -
3255
Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system
Published 2021-01-01“…IET Information Security…”
Get full text
Article -
3256
A deep learning‐based attack on text CAPTCHAs by using object detection techniques
Published 2022-03-01“…IET Information Security…”
Get full text
Article -
3257
Deep learning-driven defense strategies for mitigating DDoS attacks in cloud computing environments
Published 2025-12-01“…Cyber Security and Applications…”
Get full text
Article -
3258
Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
3259
A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
3260
Unveiling the Neutral Difference and Its Automated Search
Published 2024-01-01“…IET Information Security…”
Get full text
Article