Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3261
Hot and cold exposure triggers distinct transcriptional and behavioral responses in laboratory-inbred pond snails
Published 2025-01-01“…Water Biology and Security…”
Get full text
Article -
3262
MHSDN: A Hierarchical Software Defined Network Reliability Framework design
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
3263
Extreme moderates: Understanding low levels of violent extremism in Bosnia-Herzegovina
Published 2024-01-01“…Journal of Regional Security…”
Get full text
Article -
3264
Revocable identity‐based matchmaking encryption in the standard model
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
3265
Hardness of (Semiuniform) MLWE with Short Distributions Using the Rényi Divergence
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
3266
Effects of sub-monthly and sub-daily water level variations on water level fluctuation requirements of Phragmites australis and Phalaris arundinacea
Published 2025-01-01“…Water Biology and Security…”
Get full text
Article -
3267
Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures
Published 2021-07-01“…IET Information Security…”
Get full text
Article -
3268
Improved integral cryptanalysis of SPNbox in digital rights management systems
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
3269
Further constructions of bent functions and their duals
Published 2021-01-01“…IET Information Security…”
Get full text
Article -
3270
An Efficient Code-Based One-Time Blind Signature Scheme for Electronic Forensics
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
3271
A Comprehensive Investigation of Anomaly Detection Methods in Deep Learning and Machine Learning: 2019–2023
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
3272
Understanding the mechanisms of hypoxia-induced tissue damage in fish: The role of GasderminEa/b in Larimichthys crocea
Published 2025-01-01“…Water Biology and Security…”
Get full text
Article -
3273
Evaluation of the influence of offshore wind farm noise on the fishes and dolphins in the Pearl River Estuary
Published 2025-01-01“…Water Biology and Security…”
Get full text
Article -
3274
An embedded intrusion detection and prevention system for home area networks in advanced metering infrastructure
Published 2023-05-01“…IET Information Security…”
Get full text
Article -
3275
An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
3276
An optimisation for a two‐round good‐case latency protocol
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
3277
A Second Preimage Attack on the XOR Hash Combiner
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
3278
Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post‐quantum proposals
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
3279
Earthworm optimization algorithm based cascade LSTM-GRU model for android malware detection
Published 2025-12-01“…Cyber Security and Applications…”
Get full text
Article -
3280
MFEMDroid: A Novel Malware Detection Framework Using Combined Multitype Features and Ensemble Modeling
Published 2024-01-01“…IET Information Security…”
Get full text
Article